Skip to main content

Enhancing Identity Security with Rotate's Identity Hub

backBack

Enhancing Identity Security with Rotate's Identity Hub

Team ManagementDuration4 min

In the realm of cybersecurity, maintaining a strong identity security posture is crucial for any organization. Rotate's Identity Hub is designed to be your central solution for managing identity security posture and facilitating Identity Detection and Response.

Team Management

The Team Section of the Identity Hub allows for comprehensive management of employee identities and monitoring of their activities. Here are the key functions available:

  1. Review Workspace Sources and Connected Devices: Admins can see each employee's last login dates and inspect the devices connected to their workspace. This helps in identifying any anomalies or unauthorized access.
  2. Device Management: It's possible to disconnect inactive devices, reducing the risk of compromised devices lying unnoticed.
  3. Application Monitoring: Monitor applications connected to each employee's profile. This feature allows for the disconnection of applications that are no longer in use or are deemed risky.
  4. Authentication Controls: Check and enforce multi-factor authentication (MFA) and strong passwords for all employees. These measures significantly enhance account security.
  5. Training and Awareness: Add employees to awareness training programs to improve their understanding of cybersecurity risks and best practices.
  6. Email Protection Settings: Control settings related to email protection to prevent phishing and other email-based attacks.

Additional Remediations

To further strengthen security, the following remediations can be applied:

  • Suspending user accounts.
  • Resetting passwords.
  • Disconnecting users from all applications and devices.
  • Enforcing MFA.

These actions can be performed with just a click on each employee's record, allowing for deeper insights into their activity and enhancing their security posture.

Access Log Section

The Access Log Section is instrumental in tracking login behaviors using a geo-location heatmap and AI-driven insights. This section helps in detecting risky activities and anomalies such as impossible travel scenarios or suspicious login times and locations.

Creating and Viewing Policies

To enhance security through policy enforcement:

  1. Click "Create Policy."
  2. Select a category and the users or groups to which the policy should apply.
  3. Set your desired enforcement actions (e.g., alerts, restrictions).

This process ensures that your organization can react swiftly to potential threats while maintaining a robust and customizable security framework.

Policies Section

Rotate simplifies the process of policy creation. Leveraging AI to recommend policies based on user activity data, administrators can quickly set up tailored safeguards. This intuitive approach is accessible through a straightforward "create policy" button, streamlining the policy creation for your team.

Conclusion

Rotate's Identity Hub offers an integrated suite of tools designed to enhance your organization's identity security. By utilizing comprehensive monitoring, robust control features, and intuitive policy creation, Rotate ensures that your identity security posture is both proactive and responsive. This, in turn, protects your organization from the ever-evolving landscape of cyber threats.

Frequently Asked Questions

Sign-ins
What is an "Impossible Travel" sign-in event?

This occurs when a user logs in from two distant locations within a time period that would be physically impossible. For example:

  • 8:00 AM: Sign-in from New York.
  • 8:15 AM: Sign-in from London. This indicates possible account compromise or session hijacking.

Why is sign-in monitoring important for security?

Sign-in logs help detect unauthorized access attempts, brute-force attacks, and compromised accounts. Reviewing sign-ins can reveal impossible travel scenarios, MFA bypass attempts, or login anomalies that indicate potential breaches.

How can creating policies help enhance security?

Creating policies allows you to:

  • Proactively Manage Threats: Implement rules that automatically respond to unusual or unauthorized activities, helping to mitigate potential risks before they escalate.
  • Customize Security Measures: Tailor security settings to fit the unique needs of your organization, ensuring that protective measures align with your specific security goals.
  • Ensure Compliance: Maintain compliance with regulatory requirements by enforcing consistent policies that govern data access and user behavior.
Remediations
How to enforce MFA on a user

How to enforce MFA on a user

To enforce Multi-Factor Authentication (MFA) on a user in our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Enforce MFA section.
  5. Select the application where you wish to enforce MFA for the user.
  6. Click Enforce.

MFA will then be enforced for the user on the selected application.

How to reset a user password

How to reset a user password

To reset a user’s password on our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Reset Password section.
  5. Select the integration where you wish to reset the user's password.
  6. Click Reset Password.
  7. Follow any additional instructions if prompted.

The user’s password will then be reset according to the selected integration’s requirements.

How to Suspend a User

How to suspend a user

To suspend a user on our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Suspend Account section.
  5. Select the integrations from which you'd like to suspend the user.
  6. Click Suspend.

The user will then be suspended from the chosen integrations.

General
How Rotate Enhances Identity Security

Rotate's Identity Hub offers a comprehensive suite of features designed to strengthen your organization's identity security:

  • User and Device Management: Gain visibility into user details, monitor actions, and manage connected devices and applications.
  • Security Enforcement: Enforce Multi-Factor Authentication (MFA) and strong password policies, and enroll employees in security awareness training programs.
  • Remediation Actions: Quickly respond to threats by suspending accounts, resetting passwords, disconnecting users from all apps and devices, and enforcing MFA.
  • Access Monitoring and Anomaly Detection: Track login behaviors with geo-location heatmaps and AI-driven insights to detect risky activities and anomalies, such as impossible travel or suspicious login times and locations.
  • Policy Management: Create and enforce security policies with specific actions like alerts or restrictions to address potential threats.

By integrating these capabilities, Rotate's Identity Hub provides a robust framework to protect your organization against identity-related threats.

On this page