Automating Identity Security in Academia: Product Showcase

Watch On-Demand

Turn Identity Analytics Into Security Actions

See Bravura Security in Action

Universities and colleges need solutions that are carefully designed to strengthen  security without hindering academic goals or administrative efficiency for faculty, students, and staff. During the recent EDUCAUSE Demo Day Cybersecurity Tools event, Bravura Security highlighted how our solutions cater to the distinctive needs of universities and colleges. The session showcased the Bravura Security Fabric, including Bravura Cloud. Presented by Solution Engineer Bryan Christ and Chief Technology Officer Ian Reay, offers a tool for continuous improvement that not only provides daily and quarterly insights into an institution's security posture. As an Identity Governance and Administration (IGA) planning solution, Bravura Security Fabric assists in identifying security gaps and is pivotal in strategizing the selection of components for a robust Identity Security architecture.

Presenters

Ian Reay Headshot
Bryan Christ Headshot

 

Ian Reay, Chief Technology Officer, Bravura Security

 

 

Bryan Christ, Senior Identity Solutions Engineer, Bravura Security

Unlock Instant Value: Low-Cost, Low-Risk, High-Impact Identity Solution

 

Gain Immediate Value without Disrupting your Current Environment

The demonstration begins featuring an analytics engine adept at providing universities and colleges with a dashboard replete with insightful data. Engineered to meld with existing legacy, homegrown systems, and other IDPs like Okta seamlessly, Bravura Cloud equips users with a holistic view of an institution's identity infrastructure, pinpointing inefficiencies in provisioning and endorsing a data-centric methodology for enhancing operational effectiveness.

Affiliation Engine and the Intricacies of Entitlement Management

The Affiliation Engine is a solution adept at navigating the intricacies of managing overlapping entitlements endemic to educational settings. The engine aims to automate and simplify identity lifecycle management processes, adeptly supporting the management of an ever-growing roster of identities that educational institutions, particularly alumni systems, must maintain indefinitely.

The Unique Cybersecurity Hurdles of Higher Education

The distinct hurdles that universities and colleges face in identity and cyber security, such as staffing constraints, funding shortages, and a dependence on home grown systems can be a notable. An automation-first ethos for addressing identity and access management and governance challenges, underscores how automation enhances backend proficiency and enriches the user experience.

Streamlining Compliance Amidst a Sea of Regulations

With educational institutions besieged by an avalanche of regulations, Bravura Security's offerings simplify adherence by homing in on the crux of compliance: identities, entitlements, and privacy-centric frameworks. Bravura Cloud empowers institutions to automate compliance, ensuring audit readiness through comprehensive dashboards and reporting tools.

A Modular, Integrated Security Fabric

The Bravura Security Fabric presents a holistic solution ensemble that encompasses identity management, password governance, privileged access management, and FIDO2 MFA solutions—all highly customizable and capable of integrating with the existing digital identity ecosystem.

 

See Bravura Cloud for universities and colleges
1 Explore a comprehensive snapshot of your institution's identity integrity, showcasing up-to-the-minute data on onboarding processes, access privileges, and adherence to compliance standards.
Bravura Cloud efficiently manages faulty access
2 Initiate automated workflows with Bravura Cloud to efficiently manage new faculty access rights, ensuring a smooth integration with current systems for optimized security and productivity.
Assess Bravura reports for audit readiness
3 Detailed reports on compliance with least privilege and privacy standards, essential for the forthcoming audit and showcasing the strength of your identity security measures.

 

Review the Full Session Transcript

No time to watch the session? No problem. Take a read through the session transcript.

0:02 
Thank you for joining us for another session of Educos Demo Day Cybersecurity Tools. 

 
0:06 
My name is Jason Martin. 

 
0:08 
I'm an online event production manager at Educos. 

 
0:11 
Please as always, use that chat to share comments and ask questions for our presenters. 

 
0:15 
If you would like to use the closed captioning, please click the CC live transcript button on the bottom of the Zoom room. 

 
0:21 
And now please join me and welcoming our presenters from Bavira Security. 

 
0:26 
Brian, over to you. 

 
0:27 
Hey, Jason, Thanks for the introduction. 

 
0:30 
My name is Brian Crist. 

 
0:31 
I am a Sales Engineer at Brvora Security and I am joined today by Ian Ray, who is our CTO. 

 
0:38 
Carolyn, if you want, if you'll go ahead and move us on to the next slide. 

 
0:41 
Yep, keep going. 

 
0:43 
Just briefly introduce who we are. 

 
0:45 
So Brvora Security, we've been in the identity access management and credential space for nearly three decades. 

 
0:52 
Some of these logos here will no doubt look familiar to many of you that have joined us today. 

 
0:58 
And having worked with these folks during that, you know, 3030 plus years has given us a sort of a front row seat at the table. 

 
1:09 
And that has really allowed us to do some interesting things with the Bravura security fabric, which is comprised of these components that you see here. 

 
1:17 
Our latest introduction is Bravura Cloud. 

 
1:20 
We'll be taking a look at that in the demo today and it is dashboarding analytics Engine that has got some special features that are are great for affiliations and institutions of higher learning. 

 
1:34 
Also with Bervera Identity, we have introduced an affiliation engine which is specifically tuned to deal with things like overlapping entitlements. 

 
1:43 
And also one of our additions to the Bervera Security fabric as of recent, which is Bervera Safe, which will help your organization, both students, faculty and others manage decentralized secrets, if you will. 

 
1:54 
Carolyn, we're just going to keep moving on, keep going. 

 
2:00 
One of the things that this front row seat has allowed us to do is to really understand many of the challenges of your organization. 

 
2:06 
I'm not going to read all of these bullets here up on the screen for the sake of time. 

 
2:10 
I trust that you can do that. 

 
2:11 
I will make one simple comment here, which is while zero trust has maybe lost its luster in terms of the buzzwords along with least privilege, what we are finding nevertheless, institutions are very much concerned about the principles and the frameworks of these things. 

 
2:29 
And, and so we've we've kept that in mind as we've continued to refine our offering. 

 
2:33 
If you could generally, Yep, one of the things that is somewhat unique in our, our mind about higher education. 

 
2:42 
So in the life cycle of identity, the jointer mover lever processes themselves aren't sort of unique in terms of what happens, although maybe something like, you know, the overlap of entitlements that you find with the affiliations. 

 
3:00 
I think that's that probably is unique. 

 
3:02 
But then all the other aspects of the join remove reliever process. 

 
3:06 
What we see is there's just this amplification of the problem space. 

 
3:10 
In other words, institutions of learning deal with the bulk onboarding and offboarding of really large populations like no other vertical out there. 

 
3:20 
Also, because of your alumni systems of records, you tend to have systems where it is ever expanding, never shrinking set of identities that will need to be managed long term, if not infinitely. 

 
3:36 
Carolyn, if you'll keep moving, some of the other things that we see happening in higher education I think will ring true. 

 
3:43 
And this first one here is an issue of staffing and funding. 

 
3:48 
You can almost think of that one as a catalyst for some of these other problems that we see here. 

 
3:53 
So the the organizations we speak with, they are very, very much aware of the the various challenges that they face. 

 
4:02 
And because of things like staffing and funding, they will often turn to home grown solutions. 

 
4:09 
I like to, in a live audience, I like to raise my hand and say how many people struggle with home grown systems and just about every hand in the room goes up. 

 
4:18 
But also disparate solutions because of the home grown nature of these systems that are also often engineered where there where integration with other departments or other business units is somewhat of an afterthought. 

 
4:30 
And ultimately, at the end of the day, there seems to be quite a bit of institutional knowledge in it. 

 
4:35 
You know, there may be, you know, a handful of folks that built these systems and there's no manual for it. 

 
4:40 
It's sort of just all lives with them. 

 
4:42 
And that can be quite scary when you're thinking about the longevity of your identity program. 

 
4:49 
Keep going. 

 
4:50 
And so this is where the perverse security fabric comes into play. 

 
4:54 
And we have a unique perspective, which is an automation first approach to solving those problems. 

 
5:01 
So instead of dealing with identity and access management reactively in terms of certification and attestation, we think in terms of automating, you know that joiner move reliever process including streamlining access. 

 
5:17 
And so there's sort of this reciprocal thing that happens. 

 
5:20 
You're seeing a bunch of different concepts here up on the slide, but, but ultimately, if I streamline access, then I'm increasing efficiency and productivity on the back end. 

 
5:29 
Same with things like support and, and privacy and inclusion. 

 
5:33 
You know, if those things are being handled in a sort of self-service capacity for the end user, then you're taking that load off of the back end, you're improving the, the user experience. 

 
5:44 
And so I off, you know, as we were thinking through this slide deck, I really almost wanted to to redesign it in such a way that you could understand that these are integrated feedback mechanisms for one another, but ultimately powered and enabled by automation. 

 
5:59 
If you could, Carolyn, this particular slide here when we first sort of planned it out, we're talking, you know, it's, it's designed to highlight, you know, the fact that we recognize that there is an enormous amount of regulation that faces your particular vertical. 

 
6:17 
It can be overwhelming and this slide itself can be overwhelming. 

 
6:21 
And so we thought, well, maybe we should redesign this slide so it's not less busy is so it's less busy. 

 
6:27 
And then I sort of kind of paused on that and said, you know what, let's make it busy because we know that these, this is how these folks are feeling. 

 
6:34 
They're feeling overwhelmed. 

 
6:36 
And but we have good news, right? 

 
6:39 
And so the good news is this, if you take really any regulation and you, you boil it down to its fundamentals, they're typically concerned with a few things. 

 
6:47 
They're concerned with things like identities and, and entitlements and enforcing organizations to to embrace strong controls and then pushing, you know, the organizations towards a very a privacy centric model. 

 
7:08 
And I would argue that that's actually an outcome of doing a good governance on entitlements because really privacy is just an access control around what someone else can see about someone else, right? 

 
7:22 
So in terms of, you know, the regulation, the challenges or the the questions that are being put in these regulations to organizations is do you know who your users are? 

 
7:34 
How are you authenticating them? 

 
7:37 
What entitlements do they have? 

 
7:39 
Where do they come from? 

 
7:40 
And how did you authorize them to have those entitlements? 

 
7:43 
So you really can boil it all down to that. 

 
7:46 
And again, the good news is if you've been automating all of this stuff, the jointer remover lever processes and then you could got good dashboards and analytics tools that all of you know, then then you don't really have to worry about it. 

 
8:00 
Those particular things just become second nature. 

 
8:03 
When you do have an audit, you can simply hand over access to that dashboarding analytics reporting mechanism and, and, and then you, they can do the spot check to ensure that you're complying in all the various different ways. 

 
8:17 
Carolyn, if you will, We'll, we'll move on to the next deal. 

 
8:19 
So we wanted to sort of power through the presentation, make sure that we left ample time because we know that you folks came to see a showcase of, of our product. 

 
8:32 
And so I'm going to turn it over to Ian Ray, who is going to take you on a tour of Vera Cloud, which I mentioned earlier has been specifically tuned to surface some of the things that we know are important to your organization. 

 
8:48 
So over to you, Ian. 

 
8:51 
Great. 

 
8:51 
Thank you, Brian. 

 
8:54 
I'll just share my screen here. 

 
9:01 
OK, Brian, can I just confirm you can see my screen? 

 
9:09 
I can see your screen. 

 
9:11 
Great. 

 
9:11 
Thank you. 

 
9:12 
So welcome to our reverse Security fabric demo to dive into how our innovative Converge platform can help you create a positive and seamless digital experience for your students, faculty and staff from day one. 

 
9:27 
In particular, here, we're going to start off with our identity analytics tool for cloud. 

 
9:32 
We can help show how it can assist you in gaining insight and control over your existing the spread systems and home grown solutions without hindering your academic mission or existing business operations. 

 
9:46 
So let's get started. 

 
9:47 
We'll begin with our password list authentication experience, a fishing resistant approach to streamlining access to prefer his ecosystem. 

 
10:00 
We all support. 

 
10:01 
We can support all modern forms of authentication, including Fido 2 based solutions and identity brokering via other ID PS such as Shibboleth, Azure, and Okta. 

 
10:11 
In this case, we're going to authenticate with Windows Hello, and now that we've logged in, you can see an environment that is representative of an institution starting its identity security journey. 

 
10:34 
The Rich Analytics Dashboard is the first thing you see as a Director of Identity, or CSO. 

 
10:38 
When you log in, you want to ensure your institution's identity health is immediately visible. 

 
10:43 
Be sure to see the parts that are working well, the parts that are improving, and the parts that might require a little bit of work. 

 
10:53 
In this dashboard, first we'll show you a series of performance. 

 
10:56 
KP is, secondly, show you who isn't, who is and isn't compliant with your policies. 

 
11:04 
Third, showing you the scope of the current identity program. 

 
11:07 
And finally, showing metrics about your day-to-day business operations. 

 
11:12 
This dashboard helps you understand holistically where you currently stand, for better or for worse. 

 
11:17 
And then you can start to plan your IGA future. 

 
11:20 
For example, you can see that in this environment, provisioning times are a challenge. 

 
11:25 
81.9 hours is pretty high average. 

 
11:29 
Lengthy times for provision access can really impact productivity and increase everybody's frustration. 

 
11:35 
Visualizing and quantifying how long provisioning takes helps make a compelling case for investing in identity automation. 

 
11:43 
Nobody wants idle people waiting for their access to be granted and this data-driven approach is key to conveying the value and effectiveness of the system to sea level and trustee decision makers. 

 
11:55 
Diving deeper, you can see Access Dedicated or you can access dedicated Provisioning Dashboard. 

 
12:05 
The specialized view offers powerful insights into where friction might be developing in your user populations. 

 
12:12 
Additionally, those who don't have affiliations at all might be falling through the cracks. 

 
12:18 
By surfacing these insights, yourself and your team members connect quickly and easily. 

 
12:26 
For example, we can easily see the faculty provisioning as pain point. 

 
12:31 
276 hours to provision access is getting high. 

 
12:35 
You can drill into the provisioning requests to gain better insights about what is causing the friction. 

 
12:43 
As you can see, 232 hours on average is taken to authorize provisioning requests and this is the primary friction point of your faculty on boarding experience. 

 
12:55 
This is a classic sign of hidden friction caused by inefficient business processes. 

 
13:01 
Maybe Vanessa and her peers have to follow hidden paperwork trail since they all seem to take around the same amount of time to approve requests. 

 
13:10 
The dashboard is also telling us something else. 

 
13:13 
Once you solve your authorization problem, you can see that it's still taken on an average 29 hours to complete the provisioning actions. 

 
13:22 
This is pretty common when access is being provisioned manually by system administrators. 

 
13:27 
Visibility into this data breaks down these complex problems in your existing identity workflows and helps you plan for improvements, which could include building a case for automation to take your provisioning time from days to minutes. 

 
13:43 
And this is where our 30 years of experience with automation can really help because we've seen and done it all with modern and legacy platforms, including such challenging platforms and mainframes and homespun systems. 

 
13:58 
So now after going through this exercise, you may now have questions about who is in this affiliation. 

 
14:05 
So let's drill into this population in our affiliation diaspora. 

 
14:11 
You can immediately see key insights such as your current, your future and your past members, your metrics such as provisioning and deprovisioning time, as well as how adherent this population is to your policies. 

 
14:27 
From the single dashboard, you can see some pretty impressive aggressive growth goals in this faculty or something might not be quite right in your system of record. 

 
14:42 
We've also talked about your poor access provisioning time. 

 
14:45 
Your deprovisioning time is acceptable, but maybe not great. 

 
14:50 
A good rule of thumb is you should be able to deprovision access in less than 24 hours and there is some pretty problematic adherence to password policies. 

 
15:02 
So let's drill into a few of these questions. 

 
15:05 
So first of all, we provide you lists of your active members and your future members so you can do spot checks and understand does it look like the system of record is correct? 

 
15:16 
Do we have the people we expect to see? 

 
15:20 
And with respect to the future members, are the future members, you know, do these make sense? 

 
15:25 
Are they real? 

 
15:26 
Do you have a problem? 

 
15:28 
By surfacing this information quickly and easily, people can drill into this and determine what's upcoming in the near future. 

 
15:37 
And then also we can Scroll down into compliance breakdowns. 

 
15:41 
You can see areas where compliance is quite good. 

 
15:45 
Identify, you know, a couple people who might need a small touch up. 

 
15:50 
But we can also drill into the password policy problem. 

 
15:54 
And we can see from the trends that this has been a problem for a while. 

 
15:59 
It's not necessarily getting any worse, but it's certainly not getting any better. 

 
16:04 
And in this list, you can see the people who are failing the password or failing this compliance rule, people who aren't meeting what you need to as part of your governance programs. 

 
16:18 
And so from here, you can quickly take different types of actions, such as drilling in and seeing the details of that person, maybe going in and doing a help desk assistant password reset, submitting a request through our identity to to disable this user's access or go into the inventory UI and drilling in and seeing the full history of what's happened with them. 

 
16:45 
Or you might go and create a ticket in your ticketing system. 

 
16:49 
Depending on where you're at with your existing solutions, what your current processes are, these actions all become possible. 

 
16:57 
And we, and this is a key guiding light in terms of the for a security fabric. 

 
17:04 
When you see a problem, we want to give you immediate strategies for solving these problems. 

 
17:09 
We also want to make it sure it's an open platform that allows you to leverage your existing services you may already have in place. 

 
17:19 
Now you may also have a question around what about what the password policy is? 

 
17:25 
Can it be edited? 

 
17:26 
And then can can I build up my own policies? 

 
17:29 
The answer to all of this is yes, So let's drill into that now. 

 
17:42 
And so now we have navigated into our identity inventory service. 

 
17:49 
It provides you a portal to see your inventory of identities and compliance rules. 

 
17:53 
And we have jumped specifically into the faculty password policy compliance rule. 

 
17:59 
Compliance rules are built on two fundamental components. 

 
18:05 
1st is the preferred cloud is built on an API first strategy using Graph QL. 

 
18:11 
As you can see, you're using our extendable Graph QLAPI to query needed information to assess an identity's password, policy compliance status. 

 
18:22 
And the second is that we're leveraging Open Policy Agent, otherwise known as OPA, a highly respected policy engine with a vibrant community and extensive sets of best practices. 

 
18:35 
The output of the API is then passed into the OPA policy and then we can evaluate it to determine is the person compliant or not. 

 
18:47 
The flexibility afforded by Graph QL and our data storage strategy allows or provides you with exceptional growth opportunities such as in 3rd party risk assessments being brought in. 

 
18:59 
Take for example, some people use Pincastle risk assessments. 

 
19:03 
The outcome, the insights and outcomes from those assessments can be imported into Provera Cloud and factored into your compliance rules. 

 
19:11 
Or we could bring in 3rd party certification assessments. 

 
19:15 
If you're certifying the existence or need for different types of identities and other products, you can bring that content into here. 

 
19:23 
And if you're lacking that ability entirely right now, Provera Identity can assist you with filling in that gap here. 

 
19:30 
And furthermore, through data federation strategy, we can consult in real time the security information held in your scene systems such as Splunk or Elastic. 

 
19:40 
That information might be too large to bring in Provera Cloud, but Provera Cloud can reach out and request the necessary information to then feed that into the compliance rules on an on demand basis. 

 
19:52 
By combining these components, you get a flexible and highly scalable approach for driving continuous compliance that you can trust. 

 
20:01 
Furthermore, with this API for strategy ensures that data can be easily incorporated into other solutions that make up your digital landscape. 

 
20:09 
For example, if your reporting happens to be through Tableau, our Graph QLAPIS make it very easy to extract that knowledge and to make it available for your existing reporting needs. 

 
20:20 
And since our APIs provide fine grain level access controls. 

 
20:26 
To all of the data that underpins per Vera Cloud, you can have confidence that these systems you integrate in are only being given access to the data that is needed for their operations. 

 
20:40 
These scenarios and experiences are then assembled into compliance rule packages that can fast track your organization into assessing how well you're doing. 

 
20:50 
Other examples you might want to include identifying scenarios when name and pronoun changes have not been consistently updated through all of your systems. 

 
21:00 
Identifying people who are over privileged in their current role that they hold in the institution. 

 
21:06 
This can be pretty common when people might be with an institution for 20 years or more. 

 
21:11 
Often they accumulate rights and privileges well beyond what is normal for their role. 

 
21:16 
So being able to detect those and alert on those is very important, especially when those are privileged entitlements. 

 
21:24 
Furthermore, identifying privileged groups that have not had their memberships renewed recently or identifying security groups that have no memberships maybe should be cleaned up to make your life's easier. 

 
21:36 
Those things are easier, easy to surface now and report on. 

 
21:39 
Using these this compliance rule strategy, we can also surface accounts and like service and shared accounts that might go unnoticed in many existing identity platforms because often identity platforms focus on human accounts. 

 
22:00 
But our unique system level approach that allows us to see and discover and then provide these rich analytics and compliance checks apply to all accounts and and on the system regardless of their purpose. 

 
22:16 
That way you've got you can have confidence that things aren't falling through the cracks. 

 
22:22 
And furthermore, with data retention policies being so important, being able to detect and ensure that accounts and their data are following your workflow as appropriate, that the status on accounts that the removal of content is following your policies and procedures is important now and only going to get more important in the future here. 

 
22:45 
So this is key to how Provera Cloud can surface value from your existing investments while coexisting with your existing operations. 

 
22:54 
Data from your other platforms can be brought into Provera Cloud and this means there is no need to disrupt your operations with expensive and time consuming solution replacement or augmentation projects. 

 
23:07 
Provera Cloud can become a fundamental part in your IGA planning and continuous improvement practices. 

 
23:14 
As you can see, we've only just scratched the surface of what Pervera Cloud and the Pervera Security Fabric can do for you and your institution. 

 
23:21 
You've seen it in quick introduction to some of our analytics. 

 
23:25 
We'd really love to showcase more of this tool that we can help to further your journey. 

 
23:32 
Or how about our modular best in class identity management, password governance and privilege access management and Fido 2 MFA solutions can help you and your organization. 

 
23:45 
For those intrigued by the potential of how easily customizable dashboards, deeper policy insights and flexible integrations, we're happy to offer follow up sessions, get a little bit more hands on and to show you just how easy and powerful the perverse security fabric can be. 

 
24:02 
So thank you everybody for your time and certainly looking forward to answering a few questions here you might have. 

 
24:14 
Hey, thank you, Ian. 

 
24:16 
Appreciate it. 

 
24:16 
Yeah, folks, it's if you've got any questions, our, our moderator and host Jason is, is fielding those and is happy to put those in a place where we can go ahead and start answering those. 

 
24:33 
Just a little bit of time for folks to post those. 

 
24:44 
But yeah, so one of the questions that just came in here is this pricing based on number of users. 

 
24:50 
And so yes, in general through the Bervera Security Fabric, we price our services based on a per user pricing model here with the one exception being Bervera privilege that tends to be priced like we do offer per user pricing, but it tends to be priced on a per system basis that we integrate with because we're being asked to talk to a large number of sub systems, randomized passwords to introduce privilege access management in an organization. 

 
25:22 
And so if, if this stuff is interesting, of course we can follow up with you on some more specific scenarios. 

 
25:37 
All right, good question. 

 
25:39 
Anyone else? 

 
25:43 
So another one is, can you detail the security measures in place to protect sensitive data within pervert cloud. 

 
25:51 
So with the pervert security fabric, what we have done is taken a policy around single tenant based deployments of our solutions. 

 
26:05 
So you can host them in your own private environments if you need to or if you come or if you leverage us as our in our SAS base based hosting, then we provide each organization a dedicated tenant. 

 
26:21 
That way you can have confidence that your data will not be commingled or intertwined with other people's data, also ensuring a robust and performant platform where that that can be scalable. 

 
26:36 
In this specific case, Pervera Cloud is built on top of a Kubernetes based platform that allows for a highly scalable and also fault tolerant based hosting. 

 
26:47 
All right, we'll give it a few more minutes to see if anybody else has a question. 

 
27:04 
I'll throw this out there. 

 
27:05 
I know that as we were talking about this particular event and sort of brainstorming and anticipating what what individuals might ask us, one of the things we hear a lot is we have this old system. 

 
27:20 
We have you know some home grown system automation sounds good, but obviously there's no skim 2 standard or anything like that and we recognize that. 

 
27:30 
So one of that, one of the 30 year, you know the advantages of that 30 year heritage that we have is that we have built overtime our own connector repository. 

 
27:41 
It's about 150 connectors and growing, but it does include things like AS 400 SAP rack F mainframe, etcetera. 

 
27:52 
And then for things that we're not familiar with on the home grown side, we do have universal connectors that can leverage protocols like SQL and telnet and sort of other protocols that maybe have to be a little more coarse grained in order to talk to the systems. 

 
28:12 
But rarely one that we haven't, we haven't been able to do so with. 

 
28:16 
And of course once you get integration with those systems, automation can really make a huge benefit. 

 
28:23 
So, so let me throw that out there. 

 
28:27 
One thing I might also mention here is one of the key value items that people gain like that our customers continually come to us and and speak about is our automation centric strategy around reaching out and discovering the state of identities allows people to trust what really is in their environments. 

 
28:51 
It's not like once a quarter or once a year where you ask everybody to collect spreadsheets of who has access to what systems are our discovery that happens usually nightly or even more often than that. 

 
29:06 
And for certain platforms can allow you to have confidence that you know what is on the systems right now. 

 
29:13 
And then coupled that with the compliance rule capabilities that we showcased here allows people to start to build a continual compliance strategy that allows for them to surface out of bounds changes or potentially risky scenarios and be able to take action on them within 24 hours. 

 
29:33 
And that way you can really start to, you know, close some of your gaps. 

 
29:37 
And again, you might not be able to necessarily remove the, the, the, the out of bounds changes that are not adhering to policy. 

 
29:47 
But being able to see it quickly and doing that fast, then that allows you to get the right people involved to first of all, determine how that happened, as well as what's the right steps to fix that. 

 
29:59 
And so that can be very empowering and also to a lot of quick confidence inducing. 

 
30:05 
Yeah, I'll just add a touch to that because you know the the the two models and we I, I introduced this at the very beginning, which is the automation first model. 

 
30:14 
But I also talked about or hinted at another model which is sort of reactive, which is the attestation or certification model. 

 
30:23 
And the problem again with that approach is that it's not continual compliance. 

 
30:29 
At best, if you do some sort of round of attestation or certification, you're getting a, a portrait or a snapshot in time, if you will, of your identity and security posture. 

 
30:42 
And the moment that you on board, off board or move folks within your organization, it becomes, you know, completely obsolete. 

 
30:51 
So the approach that we're talking about here really lets you stay in continual compliance. 

 
30:57 
And then for the for the the outliers, the things that get serviced at surfaced in the dashboard and analytics, there's a rapid path to remediation. 

 
31:06 
So it's a very different approach than the, you know, certification first approach. 

 
31:14 
Good question. 

 
31:16 
I see. 

 
31:17 
Haley, I just asked a related question there. 

 
31:20 
So hopefully my answer you know, just happened to cover. 

 
31:29 
Any further questions? 

 
31:36 
OK, well, Jason or Carolyn, if you will, maybe you can share your screen. 

 
31:41 
We do have an offer for folks that have joined us today. 

 
31:49 
Yep, thank you, Carolyn. 

 
31:50 
So we do have an e-book that we have published on this topic and we would invite you to grab a copy at the URL you see here below. 

 
32:02 
And as Ian mentioned, you know, today was just the tip of the iceberg. 

 
32:07 
We really would like to showcase the entire reverse security fabric. 

 
32:14 
And so we encourage you to reach out. 

 
32:17 
Let us schedule something with you and, and, and paint a much larger, broader picture. 

 
32:26 
Jason, I think that concludes our content. 

 
32:29 
We'll go back to you. 

 
32:30 
Awesome. 

 
32:31 
Thank you so much. 

 
32:32 
Really appreciate it and thank you all for joining us. 

 
32:34 
Just a reminder to make sure and check out the resources from Bravera, Bravera Security, as well as our other presenters today on our course site. 

 
32:43 
The link is there, and it's also obviously where you came in to access today's demo. 

 
32:48 
Also, the recordings will be posted within an hour after the session, so feel free to share that with your colleagues and you'll also be able to be in touch with them through the resource page as well. 

 
32:58 
Other than that, thank you all so much, really appreciate it. 

 
33:00 
And take this opportunity please to complete the in session survey and give your feedback to Bravera. 

 
33:05 
I really appreciate it. 

 
33:06 
Thank you, Ian, Thank you, Brian, thank you, Carolyn, take care. 

 
33:11 
Thank you everybody. 

 
33:11 
Bye bye. 

Request a Demo of Bravura Cloud Today

Discover how Bravura Cloud can transform your institution's security and efficiency to empower academia.

Request a demo today to see the benefits of automated onboarding, compliance, and risk management in action. Make your institution's identity governance a business enabler with the Bravura Security Fabric.

REQUEST DEMO