Conditional Access is an established service, and a lot of enterprises already have deployed it, at least for the first basis. This component plays a key role in today’s IS security, especially in zero trust-oriented architecture.
But what signals can really be used to evaluate the access context? How far can we go today? And how complexe can it be to get there?
The reality of the field can be quite challenging compared to the theory: integration and process definition with other teams (ISP, network, device management, etc.), overall maturity on device compliance, identity type landscape, change management for end-user & IT guys and more, all represents potential pitfalls of a conditional access service deployment.
This session aims to share how a luxury brand has gone from a legacy Access Management architecture to a zero-trust ready identity landscape, and the difficulties met during this still ongoing transformation journey.