Governance & Risk Management , Identity Governance & Administration , Zero Trust

Improving Identity Management for Zero Trust Architecture

Google Cloud's Deepak Prasad on How to Have a Consolidated Identity System in Place
Deepak Prasad, customer engineer, security specialist at Google Cloud

When it comes to managing identities, most enterprises make the mistake of having silos of identity systems in place, says Deepak Prasad, customer engineer, security specialist at Google Cloud. He discusses the benefits of a consolidated identity system.

See Also: Follow the Data: Security’s 'New Now'

"One of the key pillars for a solid security foundation is to have an authoritative identity system. You really need to spend time to build a system where you can have all your identities consolidated in one place. It is important to adopt a good identity management strategy and solution," says Prasad.

In a video interview with Information Security Media Group previewing an upcoming virtual executive roundtable, Prasad also discusses:

  • How to take an identity-centric zero trust approach;
  • The current identity challenges facing organizations;
  • How to simplify identity management.

Prasad is a customer engineer, security specialist at Google Cloud. He has over 20 years of multicultural and diversified experience in cloud computing, information security, IAM, practice development, pre-sales, solution architecting, and cloud security solutions.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.