Intelligent CIO North America Issue 44 | Page 38

TALKING

‘‘ business as smiling , blinking or speaking a specific phrase , thwarting attempts to use static images or prerecorded videos .

Identity is the cornerstone of Zero Trust monitor activity inside networks . Now , organisations are seeking AI-powered identity and access management in a single solution that integrates seamlessly with zero trust architecture , combined with skilled professionals to develop , implement and support it .
Today , zero trust architecture has rapidly become the foundation of modern cybersecurity – with secure networking and identity security as the conrnerstone . In essence , Zero Trust is a concept that involves the practical application of identity and access management capabilities to perform continuous risk assessment every time resources are accessed within an environment .
How AI is evolving zero trust models
AI will also play a significant role in zero trust frameworks , as these technologies help to continuously analyse network patterns and user behaviour to identify user trends and correlations between data and access context to detect anomalies that might indicate a security threat .
The goal is to use contextual identity information to inform and optimise access policies while enforcing the principle of least privilege .
Zero Trust means granting access only for the right reasons , to the right entities , for the right amount of time . This enables a stronger security posture with no negative impact on productivity or business agility .
Zero Trust controls reduce insiders ’ ability to access systems and data that aren ’ t part of their job and
This deployment of AI drives additional intelligence needed to enable quicker and more effective responses to potential breaches and , alongside identity , will play a pivotal role in the evolution of zero trust models .
Enterprises are increasingly recognising that identity is the new perimeter , and that managing the interdependencies between identity , security and networking to adhere to true zero trust principles is a considerable challenge . p
38 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com