- The new solution aims to address the challenge of continuously evolving cyberattack patterns in the cloud, as characterized by Teleport.
- The new service gives organizations vital visibility and control over their entire infrastructure, reducing the attack surface area, identifying weak access patterns, and promptly addressing identity threats.
The new Identity Governance and Security product, which secures and governs services and user identities across multiple clouds, environments, and software-as-a-service applications, was recently made available by cloud infrastructure access management startup Teleport.
Unveiled during Teleport’s annual user conference, Teleport Connect 2023, Identity Governance and Security is engineered to enhance security by offering customers a control system that comprehensively maps access points and user identities across an organization’s entire infrastructure, ultimately minimizing attack response times.
The new approach aims to address the problem of cloud cyberattack patterns that are constantly in a state of flux, as Teleport puts it. The company claims that most detected cloud cyberattacks focus on privileged access accounts, like those for IT administrators, developers, site reliability engineers, and CI/CD system credentials, rather than using traditional malware. Since 2018, the number of identity-related attacks has doubled, indicating a shift in focus toward cloud users and service credentials.
Identity Governance and Security debuted because, according to Teleport, the shift to targeting identities leaves organizations of all sizes without a unified solution that controls and manages identities across all users, services, and protocols.
Thanks to the new service, organizations can now have essential control and visibility over every access point throughout their infrastructure. Identity Governance and Security makes it possible to quickly mitigate identity threats, identify weak access patterns, and reduce the attack surface area.
One advantage of the Identity Governance and Security Program is that it reduces the attack surface by enabling teams to grant, review, and revoke access as needed automatically. Then, the program automatically ends access after a set amount of time, lowering the possibility of a breach.
The product detects weak access patterns, and access monitoring gives information about privileged access points for infrastructure and critical data. Teams can use this feature to map and address possible weak points.
The Identity Governance and Security Program is equipped to address identity threats. With this program, teams have the capability to respond instantly by locking down any suspicious or compromised identities, effectively halting their tracks throughout the entire organization’s infrastructure.
Ev Kontsevoy, Co-founder and Chief Executive, said, “The story of Teleport Identity Governance and Security is one of simple economics. Protecting modern infrastructure with outdated solutions, not designed for the cloud, brings with it a high cost of management, security threats and a reduction in engineering velocity. Today, Teleport… solves these challenges by providing users with a unified control plane to secure and defend an organization’s entire infrastructure.”