Kris Lahiri: We integrate with all the top identity management providers. Now that I know who can get in, what types of access do they have? It’s not necessary that everybody in your finance department should automatically have access to payroll info. It’s also not true that everybody needs access to the finance folder.
This type of real-life situations that we’ve seen in the past as well as with our customers is what is built into the platform. We refer to this as our permissions model.>>>
Sramana Mitra: I would like you to isolate the different security issues of a content platform and comment on each of them. What are the challenges? How do you differentiate? What are the issues we are dealing with in the current landscape?
Kris Lahiri: I’m going to come at it from a little bit of a deeper technical perspective. Very baseline infrastructure type of issues come up. We look at any content that a customer shares or stores within Egnyte as crown jewels of that company.>>>
Excellent conversation about the security aspects of content and data and the evolution of shadow IT.
Sramana Mitra: Let’s start by introducing our audience to Egnyte and yourself. Bear in mind that we have been covering Egnyte for a while. The audience have some idea. We are going to talk about Egnyte today in the context of cyber security.>>>
Sramana Mitra: How does this trend of people working from home all the time these days and this whole gig economy thing play into all the scenarios that you’re describing?
Danny Kibel: Yes, that’s key. In the old trusted world, people were either VPN-ing into their office. In that case, they become part of this big trusted circle of their enterprise or they would work from the office which already puts them, in terms of their physical location or network physical location, in a trusted world. They’d be given almost a blank trust to do whatever it is they need to do in the organization.>>>
Sramana Mitra: Who are the key players in this space?
Danny Kibel: You see companies like Okta that started from single sign-on and are now pushing into the MFA space as well. They’re also promoting the Zero Trust concept. We’re also seeing companies like Microsoft and Ping Identity.
There are a few players in this particular space for Identity as a Service (IDaaS). But, again, our solution is a unique combination that also includes the enterprise mobility management to verify the devices as well as user behavior analytics which we were the pioneers of.>>>
Sramana Mitra: How do you solve that challenge of the Zero Trust access? How do you tackle it?
Danny Kibel: That is based on the basic foundation of Zero Trust. At Idaptive, we verify every user first and foremost. Then we verify that the device they’re using is actually a valid device that can get access to those systems.
We also basically combine User-Behavior Analytics to make sure that the users access the right system with the right level of contact. So how do we verify every user?>>>
Danny discusses Zero Trust access management.
Sramana Mitra: Let’s start by introducing our audience to yourself and Idaptive.
Danny Kibel: I’m Danny Kibel. I’m the CEO of Idaptive. Idaptive is a new company that spun out earlier in the year out of Centrify, which is a cyber security leader in the identity and access management space.>>>
Sramana Mitra: Can you suggest areas that we should cover in this discussion that the audience that we’re speaking to should know about in what you’re doing?
Ethan Schmertzler: We’re not the only company that’s starting to explore the idea of using virtual machines as dynamic disposable environments for protecting assets. You can think of Moving Target Defense as a medical glove in the sense that you can put one on and then you don’t expose any risk of data being exfiltrated.>>>