{"id":7272,"date":"2021-11-15T09:55:36","date_gmt":"2021-11-15T17:55:36","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7272"},"modified":"2023-02-28T16:10:50","modified_gmt":"2023-03-01T00:10:50","slug":"how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/","title":{"rendered":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?"},"content":{"rendered":"<h3><b>Overview<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating a user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what&#8217;s needed, and changes are logged.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Depending on where the organizations are on their technology roadmap journey, networking and security teams struggle to consistently manage their on-premises and multi-cloud infrastructures, and try to find solutions to the question &#8211; \u201cHow can we achieve user visibility in\u00a0 our on-premises and multi-cloud infrastructures?\u201d<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><b>Challenges<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Organizations are struggling to streamline their business processes to improve productivity and security for their identity life cycle management and user access control. With no identity and access authentication management strategy in place, processes are manual and not centralized. Having thousands of cloud applications to govern, limited visibility on tracking and monitoring user access to infrastructures makes it challenging to audit user events and changes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the absence of well-defined processes, it is likely that users may have inappropriate or excessive access to systems and services, increasing the risk of unauthorized access\/use of systems and data. Having limited visibility on user activity results in delays to detect which user went to a bad domain and happened to perform a malicious activity, lengthening the remediation process to identify compromised hosts and their locations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lack of real time visibility could\u00a0 result in malicious code being executed or downloaded, and undetected command and control communications, resulting in compromised access to privileged accounts and making it easy for the threat vector to gain access to systems and data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The administrative teams manually define user security policies for each role and grant user permissions, which makes it difficult to automate user based security\u00a0 in a large organization with different teams and roles.<\/span><\/p>\n<h3><b>Enhance Visibility and Control Using BloxOne Threat Defense and Azure Active Directory Integration\u00a0\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Infoblox\u2019s joint integration with Azure Active Directory is an effective solution to these challenges. Security teams can achieve user visibility and extend security to detect, block and remediate threats with the joint solution.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox&#8217;s BloxOne Threat Defense seamlessly integrates with Azure Active Directory to authenticate and identify users logging into the BloxOne platform, and assigning\u00a0 security policies based on user groups for appropriate access. The industry-leading cloud-based identity and access management service, Azure Active Directory, delivers single sign-on and multifactor authentication to help protect users and organizations.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7274\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/b1-azure-2.png\" alt=\"\" width=\"463\" height=\"354\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-2.png 463w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-2-300x229.png 300w\" sizes=\"auto, (max-width: 463px) 100vw, 463px\" \/><\/p>\n<h3><b>Benefits\u00a0<\/b><\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Username identification and security policy management<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Making it easier for administrative team members to have the sense of trust that the users joining their organization\u2019s network are securely authorized, identify user\u2019s location and track user activity. Also, have the ability to create security policies for user groups to restrict their level of interaction to the open internet.\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>DNS Security and Content Filtering\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Being able to monitor and centrally manage all aspects of DNS, helps security and network team members to minimize evolving threats, see the specific DNS queries made by a user and any security events that are triggered and figure out which user was involved. With the ability to manage and gain user visibility, the administrator also gets the flexibility to create custom user group security policies to implement content filtering and block malicious sites to lower the risk of compromise to your organization&#8217;s network.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>DNS Authentication<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Authenticate users within Azure Active Directory to access the DNS system. This allows correlation of DNS queries to a specific username within Azure Active Directory, giving administrators a great mechanism for keeping unauthorized users off the network.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Threat Detection and Remediation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Gain the ability to detect and block malicious user activity with shortened remediation timelines by identifying compromised users.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Read more about BloxOne Threat Defense<\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\"> here.<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating a user\u2019s access and authentication helps to determine whether an individual or a system is, [&hellip;]<\/p>\n","protected":false},"author":348,"featured_media":7273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[97,228,599,600,601,602,603,605,246],"class_list":{"0":"post-7272","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-azure","9":"tag-bloxone-threat-defense","10":"tag-network-access-control","11":"tag-nac","12":"tag-active-directory","13":"tag-sso","14":"tag-authentication","15":"tag-azure-active-directory","16":"tag-identity","17":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?<\/title>\n<meta name=\"description\" content=\"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what&#039;s needed, and changes are logged.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?\" \/>\n<meta property=\"og:description\" content=\"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what&#039;s needed, and changes are logged.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-15T17:55:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T00:10:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"289\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pallavi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pallavi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/\"},\"author\":{\"name\":\"Pallavi Singh\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\"},\"headline\":\"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?\",\"datePublished\":\"2021-11-15T17:55:36+00:00\",\"dateModified\":\"2023-03-01T00:10:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/b1-azure-1.png\",\"keywords\":[\"Azure\",\"BloxOne\u00ae Threat Defense\",\"Network Access Control\",\"NAC\",\"active directory\",\"SSO\",\"authentication\",\"Azure Active Directory\",\"Identity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/\",\"name\":\"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/b1-azure-1.png\",\"datePublished\":\"2021-11-15T17:55:36+00:00\",\"dateModified\":\"2023-03-01T00:10:50+00:00\",\"description\":\"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what's needed, and changes are logged.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/b1-azure-1.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/b1-azure-1.png\",\"width\":512,\"height\":289},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/cb0e7070ac45e19413b08d8713273194\",\"name\":\"Pallavi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_348_1610131824-96x96.jpg\",\"caption\":\"Pallavi Singh\"},\"description\":\"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/pallavi-singh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?","description":"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what's needed, and changes are logged.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/","og_locale":"en_US","og_type":"article","og_title":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?","og_description":"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what's needed, and changes are logged.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/","og_site_name":"Infoblox Blog","article_published_time":"2021-11-15T17:55:36+00:00","article_modified_time":"2023-03-01T00:10:50+00:00","og_image":[{"width":512,"height":289,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png","type":"image\/png"}],"author":"Pallavi Singh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pallavi Singh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/"},"author":{"name":"Pallavi Singh","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194"},"headline":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?","datePublished":"2021-11-15T17:55:36+00:00","dateModified":"2023-03-01T00:10:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png","keywords":["Azure","BloxOne\u00ae Threat Defense","Network Access Control","NAC","active directory","SSO","authentication","Azure Active Directory","Identity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/","url":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/","name":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png","datePublished":"2021-11-15T17:55:36+00:00","dateModified":"2023-03-01T00:10:50+00:00","description":"How can you utilize user identity to secure and detect threats in on-premises and multi-cloud infrastructures? As the layers of traditional security perimeters are changing, how we give access to a user is shifting from trust based on the location in the network to trust based on how we identify and authenticate a user. Validating an user\u2019s access and authentication helps to determine whether an individual or a system is, in fact, who they declare they are. Organizations trying to manage their cyber maturity controls are looking for efficient and cost-effective ways to define and implement security access authentication controls to manage risk. This includes investing in security measures like multi-factor authentication, single-sign-on (SSO), managing incorrect access attempts, handling forgotten credential requests and ensuring that the identities are secure, access granted only what's needed, and changes are logged.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/b1-azure-1.png","width":512,"height":289},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/how-can-you-utilize-user-identity-to-secure-and-detect-threats-in-on-premises-and-multi-cloud-infrastructures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How Can You Utilize User Identity to Secure and Detect Threats in On-premises and Multi-cloud Infrastructures?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/cb0e7070ac45e19413b08d8713273194","name":"Pallavi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_348_1610131824-96x96.jpg","caption":"Pallavi Singh"},"description":"Pallavi is an Associate Product Marketing Manager, Cyber Security at Infoblox. She\u2019s a cyber security enthusiast with a strong focus on cyber security management, risk assessments, and culture and awareness. She is currently managing the Technology Alliance Program (Security and Networking) content creation and GTM activities at Infoblox. Prior to joining Infoblox, Pallavi was a Cyber Security Consultant at Deloitte Canada. She has done her Masters in Telecommunication and Information Security from University of Victoria, BC and had an opportunity to Intern at Nokia Threat Intelligence Lab as a Malware Research Assistant.","url":"https:\/\/www.infoblox.com\/blog\/author\/pallavi-singh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7272"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7272\/revisions"}],"predecessor-version":[{"id":7286,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7272\/revisions\/7286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7273"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}