Veza for Zscaler: Bringing least privilege to ZIA
80% of cyberattacks involve identity-based techniques such as stolen credentials, MFA workarounds, privilege abuse, and access creep. Traditional identity tools in PAM, IGA, and IAM were not designed to answer the question of who can take what action on what data. The Beyond Identity era is here, with 2024 being the Year of Identity. Security leaders are evolving their IAM approach towards an identity-first strategy that focuses on enhancing cybersecurity posture by reducing risk and enabling digital transformation and business value. In today's rapidly changing digital landscape, ensuring seamless security and least privilege across organizations is crucial. Full integration with Zscaler Internet Access has been implemented to provide end-to-end visibility and control over user access and security policies from HR systems like Workday to Identity Providers (IdPs) such as Azure AD, AD, Okta, and now extending into the Zscaler cloud security platform. Key features include comprehensive visibility of roles and access rights in Zscaler, permissions alignment with HR systems and IdPs, automated access reviews and compliance audits, and privileged access monitoring to manage and right-size permissions for privileged accounts. These enhancements improve security posture by ensuring the correct people have appropriate access, streamline compliance efforts through detailed audit trails, and increase efficiency by automating role assignments and policy enforcement across the entire tech stack.
Company
Veza
Date published
March 22, 2024
Author(s)
Veza
Word count
342
Hacker News points
None found.
Language
English