{"id":51289,"date":"2023-03-31T19:15:10","date_gmt":"2023-03-31T19:15:10","guid":{"rendered":"https:\/\/www.darkreading.com\/emerging-tech\/adaptive-access-technologies-gaining-traction-for-security-agility"},"modified":"2023-03-31T19:15:10","modified_gmt":"2023-03-31T19:15:10","slug":"adaptive-access-technologies-gaining-traction-for-security-agility","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/","title":{"rendered":"Adaptive Access Technologies Gaining Traction for Security, Agility"},"content":{"rendered":"<p>Although only seeing tepid adoption to date, adaptive access and authentication is set to gain steam among businesses this year as organizations pursue zero-trust capabilities that grant and restrict access to data and systems based on context.<\/p>\n<p>In the latest sign of life in the evolving industry, startup company Oleria announced on March 21 that it had jumped into the market for providing adaptive access that can keep applications secure and allow access while minimizing blind spots and the overprovisioning of privileges. The company&#8217;s executives maintained that easing deployment of granular and adaptive authentication will convince business customers to more rapidly adopt the technologies.<\/p>\n<p>Companies already know that they need the context-aware security that adaptive access provides, says Jagadeesh Kunda, co-founder and chief product officer of Oleria.<\/p>\n<p>&#8220;Modern IT has become a continuous, complex system, adapting dynamically to business needs, [but] the gap we hear from CISOs and CIOs is the ability to effectively manage access,&#8221; he says. &#8220;With the typical organization running hundreds of applications to support an ever-changing environment, assigning roles and access on a static basis is no longer sufficient or sustainable.&#8221;<\/p>\n<p>While most companies strive for more granular access controls, adaptive technologies have foundered due to the complexity of the solutions. In its <a href=\"https:\/\/cpl.thalesgroup.com\/resources\/access-management\/idc-marketscape-authentication-identity-security-2021-vendor-assessment-report\" target=\"_blank\" rel=\"noopener\">2022 MarketScape report<\/a> for advanced authentication, analyst firm International Data Corp. estimated that fewer than 3 in 10 companies use multifactor authentication (MFA), which is only an initial step toward the more advanced access controls represented by adaptive access and authentication. Overall, only 9% of companies have added context-based access policies, in many ways the foundation of adaptive access controls, according to <a href=\"https:\/\/www.okta.com\/blog\/2022\/08\/state-of-zero-trust-report-2022-takeaways\/\" target=\"_blank\" rel=\"noopener\">Okta&#8217;s 2022 State of Zero Trust report<\/a>.<\/p>\n<h2 class=\"regular-text\">Cloud Native Security Means Adapting<\/h2>\n<p>Yet companies are convinced of the necessity of adaptive access, because the ability to grant users access to the appropriate data in the proper way has become significantly more important. While only 9% of companies currently have access controls based on context, a significant 42% of businesses intend to implement those policies in the next 12 to 18 months, Okta stated in its report.<\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"wum4uou8262h\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"bltbf02dc1ed6b1dc5f\" alt=\"Bar chart from the Okta 2022 State of Zero Trust report\">\n<\/picture><figcaption>Only 9% of companies use context-based access policies, but 42% plan to adopt them. Source: Okta<\/figcaption><\/figure>\n<p>The technology allows companies \u2014 and their security teams \u2014 to be more agile, says Chris Niggel, chief security officer for the Americas at Okta.<\/p>\n<p>&#8220;It helps protect data by allowing the organization to be confident that sensitive data is only being accessed by approved individuals using approved systems,&#8221; he says. &#8220;It allows IT and security teams to enable the business by more quickly granting and revoking access to this sensitive data.&#8221;<\/p>\n<p>While seemingly similar, adaptive access and adaptive authentication are slightly different concepts, Oleria&#8217;s Kunda says. Adaptive access gives a user permissions to specific resources based on the user&#8217;s behavior, the context of the request, the state of their device, and the overall organizational risk level, while <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/paving-the-road-to-zero-trust-with-adaptive-authentication\" target=\"_blank\" rel=\"noopener\">adaptive authentication<\/a> allows for changing privileges based on those criteria.<\/p>\n<p>With the two technologies, companies can determine the level of access that is appropriate in a particular context and deliver that access, he says.<\/p>\n<p>&#8220;As organizations increasingly recognize the importance of dynamically granting or denying access based on contextual factors such as user behavior and risk level, adoption of adaptive access approaches will continue to increase,&#8221; Kunda says.<\/p>\n<h2 class=\"regular-text\">Pursuing Zero Trust<\/h2>\n<p>With so much of companies&#8217; infrastructure relying on cloud, executives have increasingly focused on Zero Trust frameworks as a way to harden security while still accommodating hybrid workers.<\/p>\n<p>In addition to a secondary code or token offered by two-factor authentication, a variety of other factors can be taken into account, such as the access device, user&#8217;s location, time of day, and the current level of risk for the organization. Depending on those criteria, the user may have an easier authentication experience if they are logging into a network or service from a common location, at a regular time of day, and using a known device.<\/p>\n<p>&#8220;An access management tool might collect signals about what kind of endpoint you are working on, where you are in the world, and what your previous access patterns are, to determine level of risk,&#8221; says Michael Kelley, senior director analyst at Gartner. &#8220;That determination of level of risk is used to decide how you are authenticated and potentially, what you have access to, and what kind of access you have once you have been authenticated.&#8221;<\/p>\n<p>While most modern applications continue to use static authentication, adaptive authentication is expanding. Over the past four years, nearly every provider of access management tools has added some form of adaptive access to their products, he says.<\/p>\n<p>Adaptive access (AA) is a step along the path of Zero Trust, says Andras Cser, a vice president and principal analyst for security and risk at Forrester Research.<\/p>\n<p>&#8220;Adaptive access means lower customer friction as AA solutions only raise friction for those users that indicate [they pose] higher risk levels, [such as] using new devices, using a hitherto unknown IP address geolocation, displaying &#8216;superman&#8217; travel \u2014 logins in 10 minutes from places that are 1000s of miles apart,&#8221; Cser says.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/adaptive-access-technologies-gaining-traction-for-security-agility\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With companies pushing to adopt zero-trust frameworks, adaptive authentication and access \u2014 once languishing \u2014 looks finally ready to move out of the doldrums.Read More <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/adaptive-access-technologies-gaining-traction-for-security-agility\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51289","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-31T19:15:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Adaptive Access Technologies Gaining Traction for Security, Agility\",\"datePublished\":\"2023-03-31T19:15:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/\"},\"wordCount\":847,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbf02dc1ed6b1dc5f\\\/64260caebd7d523bd20ab6a3\\\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/\",\"name\":\"Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbf02dc1ed6b1dc5f\\\/64260caebd7d523bd20ab6a3\\\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2023-03-31T19:15:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbf02dc1ed6b1dc5f\\\/64260caebd7d523bd20ab6a3\\\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbf02dc1ed6b1dc5f\\\/64260caebd7d523bd20ab6a3\\\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/adaptive-access-technologies-gaining-traction-for-security-agility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adaptive Access Technologies Gaining Traction for Security, Agility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/","og_locale":"en_US","og_type":"article","og_title":"Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-31T19:15:10+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Adaptive Access Technologies Gaining Traction for Security, Agility","datePublished":"2023-03-31T19:15:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/"},"wordCount":847,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/","url":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/","name":"Adaptive Access Technologies Gaining Traction for Security, Agility 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2023-03-31T19:15:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbf02dc1ed6b1dc5f\/64260caebd7d523bd20ab6a3\/okta-financial-services-zero-trust.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/adaptive-access-technologies-gaining-traction-for-security-agility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Adaptive Access Technologies Gaining Traction for Security, Agility"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51289"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51289\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}