Geethika Cooray, Vice President and General Manager of Identity & Access Management at WSO2 talks about the emerging technologies and discusses how the company is consolidating its position in the market with the launch of Identity Server 7.0 later in the coming months.
How would you describe the cybersecurity landscape in the region, and what role are you playing in addressing the cybersecurity concerns of the regional enterprises?
As with any region, the cybersecurity landscape in the MEA region too is dynamic, with evolving threats requiring constant vigilance.
WSO2 specifically focuses on a subset of cybersecurity, which includes managing and controlling access to resources within an organization. Our identity & access management (IAM) platform provides robust tools for authentication, authorization, and secure identity management. With our comprehensive solutions, we help organizations strengthen cybersecurity measures as well, thereby protecting sensitive data and mitigating risks associated with unauthorized access and breaches.
Which are the latest trends that are you going to mould the future of cybersecurity in the Middle East?
In terms of IAM, we’re pushing for next-gen customer identity and access management (CIAM) that caters to digitally present businesses. Since external customers represent a large area of risk and fraud, our CIAM solutions focus on allowing access to consumers, business partners, and citizens only after they’ve proven their identities and authenticated through adaptive authentication.
What key strategic areas will WSO2 invest in 2024?
In terms of the IAM space, one of the strategic focus areas is to offer enterprises comprehensive business-to-business support. Our IAM capabilities go beyond extensive business-to-business (B2C) CIAM and workforce IAM capabilities to also offer the industry’s most comprehensive B2B CIAM support.
Can you share insights into any new products or major updates planned for release in 2024?
We’re preparing to launch WSO2 Identity Server 7.0 early this year, which will enable enterprises to compete effectively in offering exceptional, trusted digital experiences to both internal and external users. This latest release will optimize the developer experience via a new authentication API for in-app, browser-less authentication; new visual editor that enables side-by-side graphical and code views; and new one-click access to application templates and authentication methods.
How does WSO2 plan to evolve its existing product suite to meet changing market demands?
The above release in our IAM offerings builds on the proven capabilities of WSO2 Identity Server, which manages more than 1 billion identities worldwide. The uniquely extensible, API-driven product enables developers to harness the power of IAM without being security experts. It incorporates the ability to federate, authenticate, and manage identities; bridge across heterogeneous identity protocols; and secure access to web and mobile applications along with API-based endpoints. The new release will offer several new capabilities designed to enhance developers’ experiences.
Are there plans to adopt or integrate emerging technologies within WSO2’s offerings?
Every business needs to incorporate AI tools to improve current products. We at WSO2 have been working on this before the AI-as-a-service movement and have already offered features in our products that are powered by AI. We are also bringing decentralized identity and identity mesh to our digital double concept. Digital double is changing traditional digital identity representation by moving from geocentric (owned and managed by the identity provider) to heliocentric (owned and managed by the individual).
How does WSO2 plan to engage and support its customers in 2024?
With the support of WSO2’s strong partner network across the MEA region. They are certified on our products and in the best position to tailor our solutions to meet customer needs across multiple industries and diverse projects. We also have a physical presence in the MEA region with an office in Dubai, which helps to provide direct support to our customers and to actively engage with prospects as well.
How do you gather and incorporate customer feedback into your plans for continuous improvement?
Our commitment to continuous improvement is rooted in not just customer success, but our overall users, including those who use our open-source products. Actively engaging with customers and other users, we gather invaluable feedback that’s shared with the product councils. This collaborative approach shapes our product enhancements, ensuring they exceed expectations.
From your perspective, what do you predict will be the next big trends or challenges in cybersecurity over the next few years?
Possibly increased focus on AI-driven threats. Challenges may arise from the evolving sophistication of cyberattacks, requiring continuous advancements in defensive strategies. Organizations must also grapple with the growing complexity of regulatory compliance and privacy concerns, which may require a holistic and adaptive approach to safeguarding digital assets in the coming years.
What advice do you have for organisations looking to stay ahead of the curve in terms of cybersecurity preparedness and resilience?
Prioritize selecting a forward-thinking technology partner with cutting-edge expertise. Opt for a provider offering a comprehensive solution, encompassing threat detection, incident response, and ongoing updates. By aligning with a partner who’s at the forefront of security advancements, you can ensure your organization’s preparedness and resilience in the ever-evolving digital landscape.