SIA: On-premises Windows connections to IP-based targets using ZSP
Secure Infrastructure Access (SIA) now allows users to establish RDP connections to on-prem Windows targets by IP address while maintaining Zero Standing Privileges. This is particularly useful for environments where DNS infrastructure or FQDNs aren’t available, removing a common deployment blocker for extending ZSP coverage across legacy or segmented networks.
Enhance Security and Simplify Enrollment with Okta’s Same Device Enrollment
Okta’s Same Device Enrolment streamlines and secures Okta Verify enrolment by allowing users to enrol on their current device using an OIDC flow, eliminating the need for QR codes, SMS, or email, which are vulnerable to interception. This approach enhances security, aligns with authentication policies, and provides a phishing-resistant, more intuitive enrolment experience. Organisations can choose to enforce Same Device Enrollment or offer it as an option alongside mobile-based methods.
The end of legacy IAM: why CrowdStrike and SGNL together changes everything
Why This Matters
- SGNL’s continuous, context-aware authorization replaces outdated PAM and IGA solutions.
- Addresses real-time access management challenges, improving security posture.
- Offers a solution that balances security and usability for enterprises.
What Has Changed
- CrowdStrike acquires SGNL to deliver identity infrastructure that moves at the speed of threats.
- The combined platform enables real-time authorization decisions using comprehensive context.
- It allows enterprises to eliminate standing privileges and automate access decisions.
Timelines
- Immediate
Saviynt: 2026 Identity Security Trends & Predictions
Why This Matters
• AI adoption has outpaced security frameworks, creating governance gaps.
• Non-human identities (AI agents) now hold elevated privileges without proper oversight.
• Identity security has shifted from a support function to the foundation for AI resilience.
What Has Changed
• Emergence of AI agents as primary targets for attacks and insider threats.
• Machine-to-machine connections via MCP introduce new high-risk access paths.
• Data security returns as a frontline challenge due to AI’s ability to surface buried information instantly.
Timelines
Released on 05 January 2026

