Access Management , Artificial Intelligence & Machine Learning , Digital Identity

An Identity-Centric Approach to Security

Vivin Sathyan of ManageEngine on How IAM Will Establish Right User Behavior
Vivin Sathyan, senior technical evangelist, Manage Engine

An identity-centric approach to security will establish legitimate user behavior against suspicious user behavior using SIEM solution, coupled with machine learning algorithms, says Vivin Sathyan, senior technical evangelist at ManageEngine.

See Also: Xi'an Jiaotong-Liverpool University Drives Pageviews with Cloudflare Performance

The advent and purpose behind zero trust were to bring identities together using the IAM solution, Sathyan says. "An identity-centric approach boils down to user ID and device ID, and one of the ways to protect these identities is by using a SIEM solution coupled with machine learning algorithms. This will enable in decoding the behaviors of identities and secure the same."

In a video interview with Information Security Media Group at ISMG's Cybersecurity Summit in New Delhi, Sathyan discusses:

  • Aligning IAM strategy with a zero trust approach;
  • Integrating IAM with existing security frameworks;
  • Bridging the components of IAM in establishing security.

Sathyan is a senior technology evangelist at ManageEngine, a division of Zoho Corp. He presents POCs and takes care of implementation and product training in the domains of AD Solutions and IT security. He is a regular speaker at international seminars and user conferences conducted by ManageEngine.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.