Contributed by Eric Rogers, Regional Vice President, Sales – West
This past Monday marked the beginning of my fifth week at Transmit Security. I’ve been lucky to have had the opportunity to be part of some incredible companies that were later acquired for their unique solutions that solved problems that no one else was addressing. From Cyvera (now Palo Alto) to Phantom (now Splunk), I’ve worked with amazing people that built industry-leading transformational products from the ground up.
A consistent theme in my career has been to seek out companies that are addressing challenges that no one else is. At Phantom, that was tying together all the various security technologies across the enterprise that hindered threat identification and response times. Using automation and orchestration layers, Phantom connected disparate tools and systems into a single platform that automatically identified and enriched threats then mitigated them at machine speed. Time-consuming and tedious tasks were automated allowing infosec teams to focus on strategic challenges.
From various vantage points throughout my career and working with hundreds of customers, I’ve noted that identity and access challenges continue to plague many organizations, no matter what security systems they have in place nor how well they interact with each other.
The very nature of identity and access management (IAM) in most organizations is highly decentralized with components spread across nearly every channel, managed by different teams, and duplicated for almost every application.
Just like security operations a few years ago, IAM is ripe for transformation. Organizations are confronted with a siloed legacy of numerous and duplicate authentication, risk, and access technologies spread across their IT infrastructure. To add insult to injury, most of these services are hard-coded into every web and mobile application, slowing even the smallest policy changes to a crawl and rendering technology upgrades nearly impossible. The cost of constantly building, maintaining, and rewriting this code across applications is staggering.
Using APIs and abstracted identity logic, Transmit Security integrates into every existing authentication technology, risk detection service, access management system, and application then consolidates them into an intelligent, risk-aware platform. This unified IAM infrastructure enables consolidated user profiles, aggregated risk scoring, and centralized policy controls that deliver risk-based authentication, seamless cross-channel validation, and the ability to deploy identity policies and technologies in minutes, not months.
In the short time I’ve been on board, I’ve met some of the best minds in identity and access management who are dedicated to solving the challenges companies face in dealing with authentication, risk, and access. I’m excited and proud to be part of the Transmit Security team to help customers realize the potential of their IAM infrastructure.