{"id":10979,"date":"2022-03-25T02:46:04","date_gmt":"2022-03-25T02:46:04","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-kh\/blog\/2022\/03\/25\/privilege-access-management-at-the-core-of-zero-trust-access\/"},"modified":"2022-06-28T09:09:27","modified_gmt":"2022-06-28T09:09:27","slug":"privilege-access-management-at-the-core-of-zero-trust-access","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-kh\/oems\/events\/current-events\/privilege-access-management-at-the-core-of-zero-trust-access\/","title":{"rendered":"PRIVILEGE ACCESS MANAGEMENT AT THE CORE OF ZERO TRUST ACCESS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10979\" class=\"elementor elementor-10979\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a908561 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a908561\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-273f9aa3\" data-id=\"273f9aa3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b9ace8e elementor-widget elementor-widget-text-editor\" data-id=\"b9ace8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<i class=\"fa fa-map-marker\" aria-hidden=\"true\"><\/i>Webinar Room, India\n<i class=\"fa fa-calendar-o\" aria-hidden=\"true\"><\/i> 23\/12\/2020\n<i class=\"fa fa-clock-o\"> <\/i> 05:00 PM to 06:30 PM\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31f8c6ed elementor-widget elementor-widget-text-editor\" data-id=\"31f8c6ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-style: inherit; font-weight: inherit; text-align: justify; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);\">Dear Friends,<\/span><\/p>\n<p>The COVID pandemic has catalyzed and fast-tracked digital transformation program for enterprises across the globe. The investment shift from fundamental to emerging technologies to evolve agile and scalable IT infrastructure with room for contingencies is quite evident.<\/p>\n<p>This transition has neither been simple, nor its going to be one, as enterprises align all forces to traverse re-written journey with renewed timelines.<\/p>\n<p>The IT operations and Cybersecurity teams worked relentlessly and scrambled to enable the abruptly liberated enterprise workforce from well-fortified \u201cCastle &amp; Moat\u201d architecture to work from home. This phase had all the necessary ingredients to fuel cybercrime, as the security controls were not in-line with the newly evolved IT estates.<\/p>\n<p>During this un-precented lockdown, IT leadership was compelled to induct remote access technologies and cloud infrastructure overnight, on a massive scale to avoid business disruption. This paradigm shift has posed yet another problem in identifying and managing users on one side, and privilege access to the crown jewels of the enterprise on the other.<\/p>\n<p>There couldn\u2019t be a better time to discuss, ponder, evaluate and deploy \u201cNever Trust and Always Verify\u201d culture across the IT estate to achieve Zero Trust Architecture.<\/p>\n<p>iValue in association with CyberArk are delighted to invite you to this exclusive and elite roundtable discussion around new trends in User Identity Management and Privilege Access in tandem with Zero Trust architectures.<\/p>\n<p><strong>Date: 23rd December 2020<\/strong><\/p>\n<p><strong>Time: 05:00 pm \u2013 06:30 pm IST.<\/strong><\/p>\n<p>Look forward !<\/p>\n<p>Warm Regards,<\/p>\n<p>Team Marketing<\/p>\n<p>iValue InfoSolutions<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2446d53 elementor-widget elementor-widget-text-editor\" data-id=\"2446d53\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span id=\"buttoncustom\">#iValue<\/span><span id=\"buttoncustom\">#DigitalEnterprise<\/span><span id=\"buttoncustom\">#PriviledgedAccessManagement<\/span><span id=\"buttoncustom\">#CyberArk<\/span><span id=\"buttoncustom\">#MFA<\/span><span id=\"buttoncustom\">#ZeroTrustAccess<\/span><span id=\"buttoncustom\">#ZTA<\/span><span id=\"buttoncustom\">#PAM<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Webinar Room, India 23\/12\/2020 05:00 PM to 06:30 PM Dear Friends, The COVID pandemic has catalyzed and fast-tracked digital transformation program for enterprises across the globe. The investment shift from fundamental to emerging technologies to evolve agile and scalable IT infrastructure with room for contingencies is quite evident. This transition has neither been simple, nor &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/events\/current-events\/privilege-access-management-at-the-core-of-zero-trust-access\/\"> <span class=\"screen-reader-text\">PRIVILEGE ACCESS MANAGEMENT AT THE CORE OF ZERO TRUST ACCESS<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":10984,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[78],"tags":[],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/10979"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=10979"}],"version-history":[{"count":4,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/10979\/revisions"}],"predecessor-version":[{"id":12410,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/10979\/revisions\/12410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/10984"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=10979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=10979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=10979"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/whitepapers?post=10979"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/case_studies?post=10979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}