Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Zilla Security: Intelligent Identity Management Powered by AI

Truth in IT
10/30/2024
105
2 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi I'm Mike Matchett with Small World Big Data. We are here today talking about really identities. Who am I? Who are you? Well, really, when I'm working in an enterprise, anybody's working in an enterprise. Who are they in this new hybrid world? When you've got things in the data center, things in the cloud, lots of different SaaS apps. And more importantly, if I am in charge or responsible for securing their access to things, the things that are that they're getting, getting into, how do I do that in this very complex world? We've got Zilla security today. We're going to dive deep into this topic. So just hang on. Yum, yum. Hey. Welcome, Deepak. Welcome to our show. Hi, Mike. Great to be here with you. All right. We're going to talk today about what you what you've been doing with Zilla. We're going to get into AI. We're going to talk about some really cool things before we're done. But I want to start just with the idea of identity management, just to level set with everyone and how you got involved with identity as, as, you know, sort of spending your life making identity better for all of us. What does identity management and how does that how does that get you up in the morning? Yeah. Um, it's a space that I'm really passionate about. I've spent almost my entire career in the identity space. Um, identity is central to to business. If you think about, um, identity, everything that an organization does, essentially is tied into identity and access in some fashion. So the space has been around for for decades. Um, you know, historically, the concept of identities in an, in an IT environment was, was tied into individual computers. Individual host computers. We used to call them. But then as the client server computing wave came around, we, you know, the notion of directories was born. And then with with the cloud of course a lot has changed. And so we've got, um, you know, one has to worry not just about identities, but all the thousands and millions of permissions that people have across hundreds or thousands of SaaS applications in an enterprise. So identity management has sort of grown from being focused primarily on directories and authentication to more recently over the last 15 years, 20 years focused on identity governance, which is about compliance, which is about, um, life cycle management and which today in the cloud era is also about security. Because if you think about it, most data leaks today, most data breaches are rooted in some sort of identity or access exposure. So identity management has become critical. Um, indeed, a lot of organizations, a lot of folks now think that identity has taken over from the network as being the foundation of enterprise security. So it's getting a lot of attention. Right? Right. Because as you were talking about, you know, it used to be if you had access to the machine in the data center, you must have been approved. And we network things and you had to provide some different levels of authorization. And, you know, permissions were sort of also still assumed if you had access to certain things, you could get to them. We got to role based access controls on things. We got to, uh, some, some more complex ways in client server. But today, as you're explaining, I just can't even imagine, uh, in a large enterprise, really trying to do the right job of saying, you know, for every person and every different business role, what pieces of data in that organization they should have access to, you know, and getting it right. Right. It's just there's just so much potential for that huge matrix to to not be correct. It's just it's very complex. Um, so tell me a little bit then about, you know, you you have had a couple security companies, you've sold Aveksa off to RSA. Um, a decade ago already. Right. Uh, and you started Zilla here today. What is what is Zilla doing? What what what role did Zilla start to take on? What did you come back and start Zilla? Yeah. So, um, you know, at aveksa, going back 20 years, we we sort of pioneered the identity governance space. So we were the first company to focus on on managing who has access to what. Which as you, as you said, is a really complex endeavor. But managing who has access to what for compliance and for lifecycle management, for people joining the company, moving within a company or leaving leaving the company? Um, so there was that first wave of identity governance companies. And, you know, we were Aveksa was part of that first wave. Uh, and as you as you mentioned, you know, we were acquired in in 2013, but what's happened in the last ten years is the cloud has has come along and organizations have deployed hundreds of of SaaS applications. They've deployed cloud infrastructure and, um, identity has taken on, um, you know, has become the new new critical vector in the cloud. The new security vector that everyone needs to worry about. So. So in some sense identity governance is skewing towards security. So that's one one key issue. The other key issue is that the explosion of entitlements in the organization, the explosion of data, resources and permissions related to those data resources, has made the identity governance tasks much more complicated. Right. So organizations that were already burdened with a ton of manual work are now dealing with, with, you know, gargantuan, um, you know, um, problems around identity governance and the, the last sort of generation of products just can't deal with the complexity of, of that, of that, of that whole effort. And so the reason we started Zilla, going back five years now was to to enter the market with breakthrough automation for identity governance to to help people create solutions, create business processes in their organizations that simplify these tasks dramatically, that make identity governance processes such as user access reviews such as a joint process or removal process, and so on. Much simpler, um, much easier to use, much easier to deploy, more automated. And that's, that's that's the quest we've been on. All right. So you bring you bring automation because, you know, you could you could just, you know, throw out the thing and say, well, just make some policies and be done with it. But that's the the problem is so dynamic and so extensive that even making the policy was going to require a lot more help. Right? You can't just you can't just make a policy because you wanted to. You're going to have to look at hundreds and hundreds of things. And for every business rule that it's going to become possible. Uh, so let's I think this brings us around to what we're really here to talk about today, which is where you've gotten to with Zilla applying intelligence, applying machine learning, applying some AI techniques. Tell us about what you've been, what you've been up to in that space, bringing more more to the automation table. Yeah. So as you as you outlined, it's a complex problem. And if you think about it in the cloud era, there's a lot of data in any enterprise around permissions. There's a lot of data about identities. There's a lot of data about, um, the business attributes that people have. People are doing all kinds of jobs and they have all kinds of access to hundreds of applications. Right. And so when as we started to think about that and, and started to, to figure out sort of how to simplify all of this, it, you know, it became obvious to us that this data around permissions and the and the fact that the organizations were becoming more and more decentralized, um, was, was would be a great place to apply AI. Right. So, um, a lot of the manual work around giving people access or proving access, reviewing access and so on can become much easier if a lot of the access that people have can be pre-approved. And so what we've announced recently is, um, essentially the next generation of breakthrough automation, which we call Zilla AI profiles. So Zilla AI profiles goes to the heart of what, um, companies over the last 30 years have called role based access control. And so the idea with roles going back ten, 15, 20 years was to create bundles of entitlements or permissions so that permissions didn't have to be managed one by one so people could be assigned roles. And um, and the idea was that would make life much easier in terms of access management. And the challenge with that that um, organizations have struggled with now for many years is that managing roles is hard, defining roles is hard, and maintaining them is even harder. And in a world where more and more of the ownership and administration of applications is becoming decentralized, there is no central team that has the context to define roles, right? And so it's a perfect application of AI. And what Zilla has come up with is a solution that enables AI to process all of that data about people in the organization about their jobs, their business attributes, their permissions, and make predictions about what should be pre-approved. What? What is birthright access? What is recommended access, and what that ultimately results in is a set of profiles that's managed entirely by the AI. You don't need a rolls team. You don't need role owners. You simply have the AI in the background defining and maintaining these profiles, which represent pre-approved access. And having pre-approved access, makes the joiner mover leaver processes much simpler and makes the compliance processes much simpler. And so this is a we think this is a game changing approach to to identity governance. And we'll we'll make access reviews, you know, 75% easier to complete will make provisioning 60% simpler to to to put in place. Um, we've been working on this for, for over a year now. We've spent a lot of time on it. Um, our customers and partners have helped us with that. Um, and we think the AI is going to change how how enterprises govern identities and access. Yeah. If identity and access is the new security paradigm in in this complex, hybrid world, uh, and and for every person, there's hundreds of SaaS apps, thousands, if not tens of thousands of things they may or may not need permissions to or be prohibited from seeing to, to manage. Uh, I don't see how you do how you address this short of getting the help of some AI and machine learning. So it's good to see that you're on top of that. Uh, just one sort of question there. Um, with with your AI you mentioned, I mean, we've talked about access. You sort of start to mention a little bit about the governance compliance review part of this. This isn't just the upfront access to this, the proving what people have had access to or or how you've set this up is important too, right? So a lot of a lot of folks are out there going, I need to get a compliant way of showing that I'm doing the right things, setting up my identity. I just didn't give my cloud account to everybody. That's right, that's right. Um, you know, this isn't just about enabling people to do their jobs, because that is a key component. Of course. Uh, and making that operationally efficient is really important. Um, because a lot of provisioning processes are horrendously complicated. And in fact, most enterprises are drowning in provisioning tickets of one kind or another. So it's critical to, to create, um, efficient, um, provisioning processes that give people timely access to to the applications they need to do their jobs. And particularly in this age of DevOps, you know, the people who are building applications for revenue have no time to to wait. You know, you need to give them access quickly. So so that is a key part of it. However, to your point, um, organizations now need to worry about compliance proving that the right people have the right access to auditors, proving that they have business processes that, um, that, that, uh, get the access reviewed. So supervisors, application owners and so on. Um, every quarter, every couple of months in most organizations have to look at who has access to what. And there's a lot of repetitive work there, right. So there's no reason to every two months, look at every single permission that every user has. When a lot of those permissions are permissions that are pre-approved for them, they are. That's part of their job, you know. Let's review the permissions they have that that don't match up to their job description. And perhaps they're on some special project. Perhaps they're doing something, um, out of their business. Business role. Right. That's what should get reviewed so that that's the compliance angle. And then the security angle to all of this is essentially the exposures that that underlie a lot of the data breaches that are happening today. So if you, you know, if you look at most data breaches today, you can trace the history of a data breach back to some sort of identity and access exposure. Right. Oftentimes, for example, when an employee's account is taken over, you know, we hear a lot about phishing, right? So someone gets phished, their account gets taken over. You know, the rogue actor that's behind this doesn't actually start using the account they've just taken over. More often than not, they'll go create another account. They'll use this person's permissions to create another administrative account, and they'll start their mischief with a new account. Right. Well, that's the kind of thing that has to be watched. It's a new permission. And so this idea of managing who has access to what and being constantly on top of what's going on in the organization in terms of permissions, is become critical for life cycle management, business enablement critical for compliance and now critical for security as well. All right. So cybersecurity that privilege escalation threat that's always out there. The the phishing that people do to just get access. You get you get someone on a help desk line gives you their get access to that. But that person shouldn't have access to the sensitive data anyway. So lots of things going on there. Uh, man, I and we have just barely. Deepak, we've just barely scratched the, you know, the automation that you do. There's probably a demo somewhere that people would, might want to look at to get a little bit more information on how this AI works. I understand this is something people can deploy fairly quickly in their organization. Um, if someone wants to learn a little bit more about Zilla security, uh, dive into it some more. Is there any particular things they should look for, maybe on your website? Yeah. Um, you know, they should visit Zilla security. Com. We have, um, white papers they can download. Um, we have, um, you know, ways for them to see videos and demos of our product. Um, you know, we, we focus as, um, as I, as I, um, um, outlined earlier on automation. So it's, we've we've rethought a lot of what goes into these governance business processes. And we've made them really simple. And we we'd love to have folks out there who are struggling with identity compliance, identity security, with identity, with provisioning, joiner, mover, leaver processes. All of those folks visit our website and engage with us and learn more about how we've made all of that much simpler with our AI and ML solutions. A good use of AI, we might say today. Helping fight the good fight. Thank you for being here today, Deepak, explaining this to us. Um. Can't wait to see what's coming next from you all. Thank you Mike. All right, check it out. Zilla security. Com. Take care folks. Yum, yum.
In this discussion, Mike Matchett of Small World Big Data explores identity management with Deepak Taneja, Co-Founder & CEO of Zilla Security.

Matchett and Taneja examine how identity management has shifted from focusing on simple authentication to becoming the cornerstone of enterprise security, especially in cloud environments.

Taneja explains how Zilla Security utilizes advanced AI to automate and simplify identity governance, addressing the complexity introduced by permissions and entitlements across SaaS applications.

Taneja continues by discussing the role of AI in enhancing compliance reviews by focusing on anomalies and reducing administrative burdens through automated role-based access controls.

This discussion underscores the critical nature of identity management in safeguarding data and ensuring operational efficiency in today’s decentralized IT landscapes.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Small World Big Data
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cloud Webinars
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • matchett
  • inbrief
  • zilla
  • security
  • cybersecurity
  • authentication
  • cloud
  • enterprise
  • security
  • ai
  • automation
  • saas
  • identity
  • governance
  • data
  • governance
  • identity
  • management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Zilla Security: Intelligent Identity Management Powered by AI

              Upcoming Webinar Calendar

              • 10/28/2025
                12:00 PM
                10/28/2025
                Reimagining Data Security: Regain Your Control and Confidence
                https://www.truthinit.com/index.php/channel/1432/reimagining-data-security-regain-your-control-and-confidence/
              • 10/29/2025
                12:00 PM
                10/29/2025
                Practical Strategies for Platform Engineering in the AI Era
                https://www.truthinit.com/index.php/channel/1572/practical-strategies-for-platform-engineering-in-the-ai-era/
              • 10/30/2025
                06:00 AM
                10/30/2025
                Rethink secure access solutions beyond VPN and NAC in a zero trust landscape.
                https://www.truthinit.com/index.php/channel/1547/rethink-secure-access-solutions-beyond-vpn-and-nac-in-a-zero-trust-landscape/
              • 10/30/2025
                12:00 PM
                10/30/2025
                Revolutionizing Secure Access Beyond VPN and NAC for a Zero Trust Era
                https://www.truthinit.com/index.php/channel/1546/revolutionizing-secure-access-beyond-vpn-and-nac-for-a-zero-trust-era/
              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Harnessing Druva AI for Tangible Business Success in EMEA Partner Sales
                https://www.truthinit.com/index.php/channel/1554/harnessing-druva-ai-for-tangible-business-success-in-emea-partner-sales/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Strategies to Combat Click Fraud: Innovations from LinkedIn and HUMAN for Budget Protection and Enhanced Campaign Performance
                https://www.truthinit.com/index.php/channel/1583/strategies-to-combat-click-fraud-innovations-from-linkedin-and-human-for-budget-protection-and-enhanced-campaign-performance/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1556/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Fostering Trust in the Age of Agentic Commerce Through HUMAN Dialogue
                https://www.truthinit.com/index.php/channel/1582/fostering-trust-in-the-age-of-agentic-commerce-through-human-dialogue/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                Next Steps After CMMC Certification: Strategies for Ongoing Compliance and Maintenance
                https://www.truthinit.com/index.php/channel/1558/next-steps-after-cmmc-certification-strategies-for-ongoing-compliance-and-maintenance/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                02:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                More events

                Upcoming Industry Events

                • Oct
                  28

                  Reimagining Data Security: Regain Your Control and Confidence

                  10/28/202512:00 PM ET
                  • Oct
                    29

                    Practical Strategies for Platform Engineering in the AI Era

                    10/29/202512:00 PM ET
                    • Oct
                      30

                      Rethink secure access solutions beyond VPN and NAC in a zero trust landscape.

                      10/30/202506:00 AM ET
                      More events

                      Upcoming 360 View Events

                      • Nov
                        20

                        360View: Budget Optimization: Doing More with Less

                        11/20/202512:00 PM ET
                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Oct
                            22

                            Cut Ticket Resolution Time in Half with Smarter IT Documentation

                            10/22/202501:00 PM ET
                            • Oct
                              15

                              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                              10/15/202501:00 PM ET
                              • Sep
                                16

                                KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                09/16/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Oct
                                  23

                                  Secureframe: CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success

                                  10/23/202512:00 PM ET
                                  • Oct
                                    16

                                    Secureframe: ISO 27001 for Startups: Understanding Its Importance and Accelerating Certification

                                    10/16/202512:30 PM ET
                                    • Oct
                                      16

                                      EMEA Cyber Resilience for VMware: Achieving Clean Recovery with Clarity

                                      10/16/202506:00 AM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version