Access Management , Identity & Access Management , Security Operations

Identity as the New Security Perimeter

Okta's Teju Shyamsundar on the Evolution of Holistic Protection
Teju Shyamsundar, technical manager, product, Okta

The shift to the cloud has made the perimeter-centric view of security obsolete and led to the creation of the "zero trust" approach. But how do we best manage identity as the new security perimeter? Teju Shyamsundar of Okta shares insights.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

In a video interview at Information Security Media Group's recent Fraud and Breach Summit in London, Shyamsundar discusses:

  • Identity under attack;
  • The rise of zero trust;
  • What “identity as the new perimeter” really means.

Shyamsundar is a technical marketing manager with the product group at Okta. Previously, she worked at Microsoft and implemented enterprise mobility technologies across a large set of enterprise customers in various industries.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.