IBM Security Trusteer

 View Only
  • 1.  Zero Trust Security

    Posted Wed November 11, 2020 04:25 PM
    How does Trustseer compliement the Zero Trust Security Journey?

    John Martin
    Senior Security Architect
    30 Gaunt Street

  • 2.  RE: Zero Trust Security

    Posted Thu November 12, 2020 11:29 AM

    Hi John

    Thank you for bringing up this excellent topic.
    In Zero Trust - the identity risk perspective is a core pillar to every user access. Essentially moving away from the core assumption that everyone is who they claim to be through authentication, to a state in which we acknowledge malicious actors exploit that assumption and we need to look for identitiy risk in every interaction. I have described this in more length in this article: 
    I can also mention that we are now engaged in a project with a large carrier in AP that will employ Trusteer and IBM Security Vertiy Access as two main pillars for deploying Zero Trust to protect their workforce.

    Please let me know if you have any follow up questions. 


  • 3.  RE: Zero Trust Security

    Posted Thu November 12, 2020 05:12 PM
    The hardest part of zero trust is to trust selectively and appropriately. This becomes more difficult when sophisticated threats are in play. A common response to sophisticated threats is to use increased intervention (i.e. require MFA more often), but such additional friction can hurt the user experience. Trusteer provides highly accurate risk and trust determinations for web and mobile applications: This allows high security protection while optimizing the end user experience.

    Carl Hovi