#368 - Sponsor Spotlight - P0 Security

#368 - Sponsor Spotlight - P0 Security

This episode is sponsored by P0 Security. Visit p0.dev/idac to learn why P0 is the easiest and fastest way to implement just-in-time, short-lived, and auditable access to your entire infrastructure stack, like servers, databases, Kubernetes clusters, cloud consoles, and cloud services, for users as well as non-human identities.


In this sponsor spotlight episode, Jim and Jeff are joined by Shashwat Sehgal, CEO and founder of P0 Security, to discuss the evolving challenges of privileged access management in modern, cloud-native environments. Shashwat explains how traditional PAM solutions often create friction for developers, leading to over-provisioning and security risks, and how P0 is tackling this problem with a developer-first, just in time (JIT) access model. The conversation covers the core problems with developer productivity, how P0's use of technologies like eBPF provides deep visibility and control without agents, the "Priority Zero" philosophy, and how a JIT approach simplifies audits and compliance. They also discuss the competitive landscape and what sets P0 Security apart from traditional and open-source solutions.


Learn more about P0: https://www.p0.dev/idac


Connect with Shashwat: https://www.linkedin.com/in/shashwatsehgal/


Chapter Timestamps:


00:00 - Podcast Intro


00:29 - Sponsor Introduction: P0 Security


01:38 - What is the problem P0 Security is trying to solve?


03:52 - Defining "Just-in-Time" (JIT) Access


06:21 - The challenge with traditional PAM for developers


08:23 - How P0 provides access without agents using eBPF


12:15 - What does the user experience look like?


15:58 - Supporting various infrastructure and access protocols


19:15 - How does P0 handle session recording and auditing?


22:20 - Is this a replacement for Privileged Access Management (PAM)?


26:40 - The story behind the name P0 Security


29:20 - Who is the ideal customer for P0?


33:15 - Handling break-glass scenarios


36:04 - Discussing the competitive landscape


42:30 - How is P0 deployed? (Cloud vs. On-prem)


46:50 - The future of P0 and the "Priority Zero" philosophy


50:32 - Final thoughts: "Access is our priority zero."


Connect with us on LinkedIn:


Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/


Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at http://idacpodcast.com


Keywords:

P0 Security, Shashwat Sagal, Privileged Access Management, PAM, Just-in-Time Access, JIT, Developer Security, Cloud-Native Security, Hybrid Cloud, eBPF, Kubernetes, IAM, Identity and Access Management, Cybersecurity, Zero Trust, Ephemeral Access, Developer Experience, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald

Jaksot(391)

Identity At The Center #7: How the IAM Value Proposition Has Changed

Identity At The Center #7: How the IAM Value Proposition Has Changed

On this episode, Jim and Jeff talk with Luis Almeida, VP of Business Development at Identropy, about how the value proposition for IAM has changed over the years. You can read his take here. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

16 Elo 201945min

Identity At The Center #6: Black Hat 2019

Identity At The Center #6: Black Hat 2019

Warshipping, US military CAC's on the way out, and how to identify Deepfakes... all topics of discussion brought to the table by Jeff who has his boots on the ground at the annual Black Hat conference in Las Vegas. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

9 Elo 201933min

Identity At The Center #5: What Just Left Your Wallet?

Identity At The Center #5: What Just Left Your Wallet?

On this episode, Jim and Jeff talk about the recent news regarding the Capital One data breach and what might have been the motivations behind the incident. They also reference this video when talking about man in the middle attacks against two-factor authentication. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

2 Elo 201928min

Identity At The Center #4: The Circle of (IGA) Life

Identity At The Center #4: The Circle of (IGA) Life

On this episode, Jim talks with Jeff about his idea in an upcoming article he is writing about the IGA lifecycle: Approve - Provision - Collect - Verify Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

26 Heinä 201930min

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

On this episode, Jim and Jeff talk about Kacy Zurkus' article "Healthcare Organizations Too Confident in Cybersecurity" for InfoSecurity Magazine and why multi-factor authentication (MFA) isn't more widely adopted. Jeff also poses a question to Jim: Do you choose MFA or Privileged Access Management (PAM) first if you can only do one? Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

19 Heinä 201932min

Identity At The Center #2: Getting into the sexy world of IAM

Identity At The Center #2: Getting into the sexy world of IAM

With Jim on vacation this week, Jeff has called up Fletcher Edington as a pinch hitter. Fletcher talks about his path from college intern to IAM implementation engineer to IAM sales. They also talk about how to get young talent into the IAM space to solve the UI and design challenges of the future. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

12 Heinä 201931min

Identity At The Center #1: Introduction to an IAM Strategy Framework

Identity At The Center #1: Introduction to an IAM Strategy Framework

It's our first one! Hosts Jim McDonald and Jeff Steadman have a combined 30 years of experience in the identity and access management field. In this episode, they talk about how to create identity and access management strategies to better secure your organization. ***Correction - In this episode, we mention our friend Mario. He works at Callsign and not Transmit Security. Sorry, Mario!***

2 Heinä 201937min