Cloud security and identity governance

Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.

Over the years, we have seen many kinds of attacks on federal data sets. After failing at many attempts, it looks like the current approach is to lock down everything, commonly called Zero Trust.

If that is the case, then how does a large organization allow access to these buttoned-up documents?

Head shot of Diana Volere
Diana Volere, chief evangelist & director of Product Marketing, Saviynt

Many argue the answer is the Identity Governance Administration (IGA). Saviynt has been recognized as a leader in the IGA group of companies and, this week on Federal Tech Talk, Diana Volere, Saviynt’s chief evangelist and director of Product Marketing, explained how their system works for federal applications.

Essentially, allowing access to documents combines identity governance with four levels of access: Application, data, infrastructure, and cloud. Volere gave an example of how each of these topics is addressed with Saviynt.

When a systems manager considers access management, they have many considerations. For example, how would this system work in today’s hybrid environments? Systems today may get bombarded with data that is structured and unstructured; it could be located on-premises or in the cloud.

Further, with the increased interest in robotic process automation, how does an identity system integrate with advanced robotic processes? Finally, one must understand that just because an identity system works at one level, it may not scale.

Related Stories


Federal Tech Talk

TUESDAYS at 1:00 P.M.

Host John Gilroy of The Oakmont Group speaks the language of federal CISOs, CIOs and CTOs, and gets into the specifics for government IT systems integrators. Follow John on Twitter. Subscribe on Apple Podcasts or Podcast One.

Sign up for breaking news alerts