#275 - IDAC Sponsor Spotlight - Sonrai Security

Published: April 17, 2024, 9 a.m.

In this episode, Jim and Jeff welcome back Sandy Bird, the CTO and Co-Founder of Sonrai Security, for a sequel to their first sponsor spotlight. Sandy returns to discuss the groundbreaking Cloud Permissions Firewall with Permissions on Demand. The trio dives into how this new solution revolutionizes the way organizations can clamp down on excessive cloud permissions, streamline operations, and secure their cloud environments with unprecedented speed and efficiency.

\n

The discussion illuminates the concept of "default deny," the exhilaration of zapping "zombie" identities, and the seamless integration with cloud native tools. Sandy also shares insights on how customers can measure success with Sonrai\u2019s solution and the significant security benefits provided.

\n

For a visual walkthrough of Sonrai\u2019s Cloud Permissions Firewall, visit http://sonrai.co/idac to see the demo in action and learn how you can try it out with a 14-day free trial. And if you're at RSA, AWS re:Inforce, or Gartner IAM, look for the Sonrai Security booth and experience the epiphany moment for yourself.

\n

Connect with Sandy on LinkedIn: https://www.linkedin.com/in/sandy-bird-835b5576

\n

Learn more about Sonrai Security: https://sonrai.co/idac

\n

Introducing the Cloud Permissions Firewall (YouTube): https://www.youtube.com/watch?v=ffQbM6KGDbY

\n

Connect with us on LinkedIn:

\n

Jim McDonald:\xa0https://www.linkedin.com/in/jimmcdonaldpmp/

\n

Jeff Steadman:\xa0https://www.linkedin.com/in/jeffsteadman/

\n

Visit the show on the web at idacpodcast.com and follow\xa0@IDACPodcast\xa0on Twitter.

\n

Episode Keywords

\n

Identity And Access Management (Iam), Cloud Security, Aws, Azure, Gcp (Google Cloud Platform), Least Privilege, Identity Risk, Cloud Permissions Firewall, Infrastructure As Code, Security Operations (Secops), Cloud Operations (Cloudops), Permissions Management, Excessive Privileges, Zombie Identities, Identity Governance, Access Analyzer, Sensitive Permissions, Role-Based Access Control (Rbac), Service Control Policies (Scp), Cloud Native Security