Suche senden
Hochladen
Zero Trust Enterprise Network at Adobe
âą
3 gefÀllt mir
âą
2,437 views
Vishwas Manral
Folgen
Overview of implementation of Zero Trust in Adobe
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 19
Empfohlen
Zero trust Architecture
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
Â
Zero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
Â
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
KlausSchwegler
Â
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
Â
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
Â
Building a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
Â
Zero Trust Framework for Network Securityâ
Zero Trust Framework for Network Securityâ
AlgoSec
Â
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
Â
Empfohlen
Zero trust Architecture
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
Â
Zero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
Â
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
KlausSchwegler
Â
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
Â
Cloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
Â
Building a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
Â
Zero Trust Framework for Network Securityâ
Zero Trust Framework for Network Securityâ
AlgoSec
Â
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
Â
Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
Â
Spring security
Spring security
Saurabh Sharma
Â
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
Â
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
VMware Tanzu
Â
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays
Â
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
Ferdin Joe John Joseph PhD
Â
Cloud security Presentation
Cloud security Presentation
Ajay p
Â
GCP Cloud Storage Security
GCP Cloud Storage Security
Joseph Holbrook, Chief Learning Officer (CLO)
Â
Event driven microservices
Event driven microservices
Anthony Martin
Â
Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
Â
Cloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
Â
Microservices Architectures on Amazon Web Services
Microservices Architectures on Amazon Web Services
Amazon Web Services
Â
Secure your app with keycloak
Secure your app with keycloak
Guy Marom
Â
ztna-2-0-report.pdf
ztna-2-0-report.pdf
Anto664537
Â
WebAuthn and Security Keys
WebAuthn and Security Keys
FIDO Alliance
Â
Ping Identity
Ping Identity
Ping Identity
Â
F5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
Â
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Veritis Group, Inc
Â
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
Â
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
apidays
Â
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
Â
ciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
Â
Weitere Àhnliche Inhalte
Was ist angesagt?
Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
Â
Spring security
Spring security
Saurabh Sharma
Â
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
Â
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
VMware Tanzu
Â
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays
Â
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
Ferdin Joe John Joseph PhD
Â
Cloud security Presentation
Cloud security Presentation
Ajay p
Â
GCP Cloud Storage Security
GCP Cloud Storage Security
Joseph Holbrook, Chief Learning Officer (CLO)
Â
Event driven microservices
Event driven microservices
Anthony Martin
Â
Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
Â
Cloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
Â
Microservices Architectures on Amazon Web Services
Microservices Architectures on Amazon Web Services
Amazon Web Services
Â
Secure your app with keycloak
Secure your app with keycloak
Guy Marom
Â
ztna-2-0-report.pdf
ztna-2-0-report.pdf
Anto664537
Â
WebAuthn and Security Keys
WebAuthn and Security Keys
FIDO Alliance
Â
Ping Identity
Ping Identity
Ping Identity
Â
F5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
Â
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Veritis Group, Inc
Â
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
Â
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
apidays
Â
Was ist angesagt?
(20)
Zero Trust Network Access
Zero Trust Network Access
Â
Spring security
Spring security
Â
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Â
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
Â
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
Â
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
Â
Cloud security Presentation
Cloud security Presentation
Â
GCP Cloud Storage Security
GCP Cloud Storage Security
Â
Event driven microservices
Event driven microservices
Â
Zero trust deck 2020
Zero trust deck 2020
Â
Cloud Audit and Compliance
Cloud Audit and Compliance
Â
Microservices Architectures on Amazon Web Services
Microservices Architectures on Amazon Web Services
Â
Secure your app with keycloak
Secure your app with keycloak
Â
ztna-2-0-report.pdf
ztna-2-0-report.pdf
Â
WebAuthn and Security Keys
WebAuthn and Security Keys
Â
Ping Identity
Ping Identity
Â
F5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Â
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Identity and Access Management (IAM):Â Benefits and Best PracticesÂ
Â
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
Â
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
APIsecure 2023 - Security Considerations for API Gateway Aggregation, Yoshiyu...
Â
Ăhnlich wie Zero Trust Enterprise Network at Adobe
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
Â
ciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
Â
DesafĂos de la Ciberseguridad en un ecosistema digitalmente transformado
DesafĂos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
Â
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Amazon Web Services
Â
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
Â
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
Â
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
Bitglass
Â
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
Vuzion
Â
AWS November meetup Slides
AWS November meetup Slides
JacksonMorgan9
Â
AWS User Group November
AWS User Group November
PolarSeven Pty Ltd
Â
Cloud & Software Terms Defined
Cloud & Software Terms Defined
Namtek Consulting Services
Â
Multi-tenancy In the Cloud
Multi-tenancy In the Cloud
sdevillers
Â
Securing Your Cloud Applications
Securing Your Cloud Applications
IBM Security
Â
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Standards Customer Council
Â
Key Capibilities.pptx
Key Capibilities.pptx
MuhammadNaumanAkram1
Â
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Amazon Web Services
Â
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
Amazon Web Services
Â
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszĆoĆci. Ćmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszĆoĆci. Ćmierte...
3camp
Â
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
EnterpriseGRC Solutions, Inc.
Â
Practical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
Â
Ăhnlich wie Zero Trust Enterprise Network at Adobe
(20)
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
Â
ciscothousandeyesusecase
ciscothousandeyesusecase
Â
DesafĂos de la Ciberseguridad en un ecosistema digitalmente transformado
DesafĂos de la Ciberseguridad en un ecosistema digitalmente transformado
Â
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Â
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Â
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
Â
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
Â
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
Â
AWS November meetup Slides
AWS November meetup Slides
Â
AWS User Group November
AWS User Group November
Â
Cloud & Software Terms Defined
Cloud & Software Terms Defined
Â
Multi-tenancy In the Cloud
Multi-tenancy In the Cloud
Â
Securing Your Cloud Applications
Securing Your Cloud Applications
Â
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Â
Key Capibilities.pptx
Key Capibilities.pptx
Â
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Â
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
Â
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszĆoĆci. Ćmierte...
Chmura nieuchronnym elementem Twojego IT w (nie)dalekiej przyszĆoĆci. Ćmierte...
Â
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Â
Practical Security for the Cloud
Practical Security for the Cloud
Â
Mehr von Vishwas Manral
IDSA Overview at CSA SV
IDSA Overview at CSA SV
Vishwas Manral
Â
0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrity
Vishwas Manral
Â
Blockchain & Security in Oracle by Emmanuel Abiodun
Blockchain & Security in Oracle by Emmanuel Abiodun
Vishwas Manral
Â
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
Vishwas Manral
Â
CSA SV Threat detection and prediction
CSA SV Threat detection and prediction
Vishwas Manral
Â
Docker security microservices
Docker security microservices
Vishwas Manral
Â
Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2
Vishwas Manral
Â
Mehr von Vishwas Manral
(7)
IDSA Overview at CSA SV
IDSA Overview at CSA SV
Â
0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrity
Â
Blockchain & Security in Oracle by Emmanuel Abiodun
Blockchain & Security in Oracle by Emmanuel Abiodun
Â
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
Â
CSA SV Threat detection and prediction
CSA SV Threat detection and prediction
Â
Docker security microservices
Docker security microservices
Â
Microservices security CSA meetup ppt 10_21_2015_v2-2
Microservices security CSA meetup ppt 10_21_2015_v2-2
Â
KĂŒrzlich hochgeladen
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Â
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Â
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Â
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Â
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Â
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Â
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Â
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Â
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Â
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Â
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Â
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Â
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Â
KĂŒrzlich hochgeladen
(20)
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Â
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Â
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Â
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Â
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Â
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Â
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Â
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Â
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Â
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Â
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Â
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Â
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Â
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Â
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Â
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Â
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Â
Zero Trust Enterprise Network at Adobe
1.
© 2019 Adobe. A
Path to Achieving Network Security ZEN Den Jones, Aron Anderson, Carlos Martinez
2.
© 2019 Adobe.
xxx Zero-Trust: Why Do We Need It? We mistakenly consider the corporate network safe Network perimeter no longer a security boundary Evolving tactics, techniques & procedures (TTPâs) External (SaaS) Resources Authentication ignored the device
3.
© 2019 Adobe.
xxx Defining Zero Trust â What Is It? All networks considered untrusted Authentication is now based on user and device posture Security boundary evolved
4.
© 2019 Adobe.
xxx Internal Applications Defining Zero Trust â What Is It? Security boundary evolved All networks considered untrusted ZEN Platform Authentication is now based on user and device posture External (SaaS) Resources
5.
© 2019 Adobe.
xxx Purpose § Transform our network and applications to a âcloud-likeâ state § Enable application access without the need to be internal or use VPN § Secure network level access based on user and device posture 5
6.
© 2019 Adobe.
xxx Leverages Existing Investments In⊠Authentication Network Access Control Logging Endpoint Detection & Response Device Management
7.
© 2019 Adobe. ZEN
Overview LEGEND Client challenged for certificate Active Directory Compliance check to Access Policy Engine AuthN request to IdP Client challenged for certificate Compliance check to Access Policy Engine Allow access if all conditions met 1 2 3 4a 4b 4c 5 xxx
8.
© 2019 Adobe. ZEN
Overview LEGEND Request goes to web app App makes AuthN request to Okta Okta delegates AuthN request to vIDM vIDM challenges client for certificate Certificate sent for authentication CRL/OCSP Check CRL/OCSP Response Compliance Check Response (Compliant) If cert valid, vIDM generates SAML response and send to Okta Okta validates SAML, challenges for MFA generates new SAML response and sends to app App validates SAML and if valid, redirects user to protected application content 1 2 3 4 5 6 7 8 9 10 11 12 xxx
9.
© 2019 Adobe.
xxx Demo â compliant device 9
10.
© 2019 Adobe.
xxx Demo â non-compliant device 10
11.
© 2019 Adobe.
xxx User Behavior Analytics (UBA) § Applying data science and algorithms to identify anomalous activity
12.
© 2019 Adobe.
xxx Purpose § Scale detection and prioritize analysis § Identification of anomalous events based on ML and statistical analysis § Leverage existing investments § Built using existing log and data sources (user auth events, endpoint posture) § Engage the user in the security process § User notification with call to action § Programmatic activity based on user response § Device posture published to central portal (Trust Score Engine) 12
13.
© 2019 Adobe.
xxx User Analytics Overview 13 API call to log sources âą Logon events for specified window âą User or device specific info (travel data example) âą Data filtering to specific employee and event types Generate features based on checks âą Examples: âą IP correlation (Adobe owned) âą Match based on threat intel (UAS, Geo, IP) âą Inclusion of known travel data âą Comparison with attribute whitelists âą Statistical and ML analysis using historical data Data tracking and escalation âą Add features to dataset (including DB) âą Escalation to users using email and portal (API based) âą Parsing of user responses (Escalation or updates to user whitelist)
14.
© 2019 Adobe. Progress
To Date § Certificates deployed to over 42,000 devices § 2000+ ZEN enabled applications § 30+ applications available via proxy § Trust Score Engine in production § Positive user response and interactions § 17,000+ employees don't have to change passwords every 90 days § Increased business process and user visibility § Identification of previously undetected malicious activity § Support for user workflow improvements xxx
15.
© 2019 Adobe. Lessons
Learned § No single off-the-shelf solution exists § Bringing vendors together is time consuming § Technology overlap
16.
© 2019 Adobe. IDSA
Participation Benefits § Forum for pushing cross-vendor initiatives § Provides reality to the vendor âecho-chamberâ § Exposure to vendors, technologies, use cases, best practices § Improves knowledge and effectiveness of the team § Help drive innovation in the industry with vendors and solution providers
17.
© 2019 Adobe. IDSA-DP-002 17
18.
© 2019 Adobe.
xxx Resources § Adobe Zero-Trust Whitepaper https://adobe.com/go/projectZEN § Trust Center https://trust.adobe.com § Open Source CCF v2.0 https://www.adobe.com/go/open-source-ccf § Security @ Adobe blog https://blogs.adobe.com/security/ § Advisories and updates https://www.adobe.com/support/security § Twitter: @AdobeSecurity, @DenJonesCyber (Den Jones)
19.
© 2019 Adobe.