IGA Zero Trust Architecture – Identity Pillar – SailPoint and Zscaler

Home Forums IGA Zero Trust Architecture – Identity Pillar – SailPoint and Zscaler

Tagged: ,

  • This topic is empty.
Viewing 1 post (of 1 total)
  • Author
    Posts
  • #404
    admin
    Keymaster

    What is ZTA ?

    Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Zero trust focus on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.

    SailPoint IGA platform integrated with Zscaler to enforce ZTA for cloud applications.

    To manage the lifecycle of users and groups, SailPoint integrates with Zscaler using the SCIM (System for Cross-domain Identity Management) protocol.The joint solution provides identity and policy management and enforcement of those policies.

    The integrated solutions allow enterprises to:
    • Secure gateway for all applications public or private
    • Provides governance for all users and groups within Zscaler
    • Free-up admins time by automatically updating user recorders in both systems
    • Enforce policy and governance in Zscaler’s ZIA and ZPA.
    • Provide users with fast, secure access to the Internet and SaaS
    • Provide users with zero-trust, secure access to internal applications

    Integration Benefits:
    • Secure gateway for all applications public or private
    • Provides governance for all users and groups within Zscaler
    • Free-up admins time by automatically updating user recorders in both systems
    • Enforce policy and governance in Zscaler’s ZIA and ZPA.

    About ZscalerZscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates a massive, global cloud security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss.

Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.