<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Reflections from Gartner's IAM Summit 2018

By Sophia Zheng | December 10, 2018 at 4:54 AM
Copy of Gartner Identity & Access Management SummitDecember 3 - 5, 2018Caesar's Palace, Las Vegas NVBitglass booth 119

The Bitglass team just returned from the Gartner Identity and Access Management Summit in Las Vegas. At the booth and during speaking sessions, it seemed like there were several trends in identity and data protection that continually bubbled to the surface.

First, the use of user and entity behavior analytics (UEBA) is essential for businesses to protect data. Several speakers emphasized that requesting passwords is no longer enough. Now, companies must use UEBA not only to ensure that users are who they say they are, but also to make sure that they are not performing any anomalous, harmful actions or accessing sensitive data in an unauthorized fashion. UEBA helps with this by analyzing user behavior and creating a baseline of standard activity. In this way, atypical behavior can be detected in real time.

From there, cloud access security brokers (CASBs) can work with IAM tools (or leverage their own native capabilities) to provide security. During both speaking sessions and conversations at the booth, conference goers discussed how authentication and visibility are not enough – the ability to remediate threatening user behavior is critical for complete cybersecurity. What good is visibility if it doesn't enable any action? CASBs can improve the IAM posture of any company by detecting suspicious user behavior, enforcing access management policies, and preventing data from being exfiltrated.

Finally, passwordless authentication seemed to be a growing topic of conversation – whether it was a QR code, biometrics, or a chip that contains all of your passwords. Additionally, the need for multiple factors of authentication, such as Google Authenticator or SMS tokens sent via text or email, was also emphasized quite heavily. Needless to say, the IAM summit was filled with excellent ideas about how to ensure more robust, comprehensive, flexible identity and access management. 

Outside of the conference, the team enjoyed swinging by Topgolf for a couple of rounds at the driving range. Las Vegas was fun, and we can’t wait to be back for the next big conference! 

To learn more about how CASBs can help you secure data in the cloud, check out our Definitive Guide to CASBs below. 

Download the Definitive Guide to CASBs