Radiant Logic participates in NIST’s NCCoE Zero Trust Architecture project

Radiant Logic announced that it has been selected by the National Institute of Standards and Technology (NIST)’s National Cybersecurity Center of Excellence (NCCoE) to contribute critical identity capabilities to their new Zero Trust Architecture project. This initiative is part of a growing effort to create a robust cybersecurity posture among federal agencies and respond to a growing threat landscape.

This week it was announced that a select group of technology collaborators, including Radiant Logic, were chosen to work with NIST’s NCCoE to develop several approaches to a zero trust architecture—applied to a practical, general purpose enterprise IT infrastructure—which will be designed and built according to the concepts and tenets documented in NIST Special Publication (SP) 800-207, Zero Trust Architecture.

“A zero trust approach relies on a strong identity foundation,” says Joe Sander, CEO of Radiant Logic. “We believe that offering a single pane of glass for context-driven identity data will accelerate interoperability and eliminate identity integration challenges, making identity an enabler of a secure enterprise architecture instead of a risk vector.”

Interest in zero trust is growing across market segments as organizations struggle to stay ahead of cybersecurity threats. The White House issued an Executive Order in May 2021 requiring that federal agencies harden their security posture, with a strong drive towards zero trust architecture at the center to ensure the safety and privacy of the American public. This timely project from the NCCoE aims to showcase the powerful security features of a zero trust architecture using commercially available solutions, like RadiantOne, applied to several common enterprise IT use cases.

Radiant Logic’s latest NIST engagement builds on the company’s success with NCCoE/NIST’s Access Rights Management framework, when it was included in a 2018 reference architecture for the financial services industry.


Read more at: Help Net Security