THE DANGER OF REPLICATING IDENTITIES IN THE CLOUD

Xiid®, with its Zero Knowledge Networking (ZKN) architecture, is the sole provider of identity access management (IAM) services that doesn’t replicate enterprise identities in the cloud.

That makes ZKN unique.

The AZT ZKN architecture never replicates or exposes in any way enterprise identities in the cloud. The architecture of all IAM services, including Okta, Microsoft, Ping Identity, OneLogin, Auth0(Okta) ForgeRock, JumpCloud, CyberArk, etc., relies on replicating its customers’ enterprise identities in the cloud. These “replicating architectures” increase the attack surface rather than decrease it!

Once enterprise identities are in the IAM services’ cloud, those identities are managed by that third party and they have full visibility and control of the enterprise operation. This brings even more risk to the enterprise. Can that third party be trusted? With the AZT ZKN architecture, Xiid does not know and does not use any of its customers’ identities and is not aware of advanced data access that Xiid will make available with upcoming services.

While the ZKN architecture can’t obviate all risk of compromise due to “human factors,” it contains those risks solely to privileged, internal enterprise resources. No third parties and no subcontractors to third parties are involved in the operation.

The ZKN architecture is designed to enable an incremental, non-disruptive transition from legacy IAM to a modern, highly secure solution. To learn more about how we can help, contact us at info@xiid.com.

Previous
Previous

THE PROBLEM WITH MFA