Managed Identity Security

managed identity security

Major identity breaches have become more common than ever, and many of them come down to something as simple as a single set of credentials. Just one compromised identity can end up being catastrophic to an organization. Just ask companies like Equifax, Target, eBay, and Yahoo (CNN). Becoming the victim of a compromised identity can destroy a tremendous amount of company value. As a result, organizations everywhere are heightening their focus on security. So when IT admins start considering methods they can use to protect their organizations, one common question keeps coming up. Can a managed identity security platform help?

Traditional Identity Security

virtual identity

Historically, identities have most often been stored within the Microsoft Active Directory® (AD) platform. This identity provider was created in the late 90s, and over the last two decades it has become a monopoly in the space. Even as new technology came out that AD couldn’t support, most products chose to build on top of AD rather than try to replace it. There wasn’t much of a choice, due to AD being the backbone of so many organizations. As a result, a large number of organizations use AD for identity security.  

Active Directory’s model for identity security has always been to keep identities at the center of the network and build strong security mechanisms around them. This strategy for defense is in depth, and the layered security model has been the approach for nearly two decades now. It worked well over that time, but it is quickly losing its effectiveness.

Why AD Identity Security is Not as Effective Anymore

Active Directory Server fail

Unfortunately, with the modern approach to IT networks, this layered security model is now being blown up. With the introduction of the cloud, mobile devices, remote workers, and more, the assumption that an IT network has a perimeter and a center is no longer valid. When operating in this new IT network, where does Active Directory live? The answer is it doesn’t.

These challenges have led modern IT organizations to shift to a cloud identity management platform called JumpCloud Directory-as-a-Service® (DaaS). The modern IDaaS (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin