{"id":2209,"date":"2021-04-13T12:06:58","date_gmt":"2021-04-13T19:06:58","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2209"},"modified":"2023-11-07T17:28:40","modified_gmt":"2023-11-07T22:28:40","slug":"identity-the-bedrock-for-all-security","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","title":{"rendered":"Identitas - Landasan untuk Semua Keamanan"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Identitas adalah bidang kontrol untuk menghubungkan pengguna dan data dengan aman. Namun, mendapatkan identitas yang \u2018benar\u2019 lebih sulit dari sebelumnya. Bergabunglah dengan webinar SecurID pada tanggal 15 April 2021 untuk mendengar dari para ahli identitas dan mempelajari bagaimana identitas dapat meningkatkan keamanan dan ketahanan operasi Anda.<\/p>","protected":false},"author":2,"featured_media":2210,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity \u2013 the Bedrock for All Security - RSA<\/title>\n<meta name=\"description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta property=\"og:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T19:06:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T22:28:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Identity \u2013 the Bedrock for All Security\" \/>\n<meta name=\"twitter:description\" content=\"Learn why identity is the ideal control plane for securing users and data.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Identity \u2013 the Bedrock for All Security\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"},\"wordCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\",\"name\":\"Identity \u2013 the Bedrock for All Security - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"datePublished\":\"2021-04-13T19:06:58+00:00\",\"dateModified\":\"2023-11-07T22:28:40+00:00\",\"description\":\"Learn why identity is the ideal control plane for securing users and data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-identity-the-bedrock-for-all-security.jpg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/resources\\\/blog\\\/multi-factor-authentication\\\/identity-the-bedrock-for-all-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity \u2013 the Bedrock for All Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identitas - Landasan untuk Semua Keamanan - RSA","description":"Pelajari mengapa identitas adalah bidang kontrol yang ideal untuk mengamankan pengguna dan data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_locale":"id_ID","og_type":"article","og_title":"Identity \u2013 the Bedrock for All Security","og_description":"Learn why identity is the ideal control plane for securing users and data.","og_url":"https:\/\/www.rsa.com\/id\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","og_site_name":"RSA","article_published_time":"2021-04-13T19:06:58+00:00","article_modified_time":"2023-11-07T22:28:40+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Identity \u2013 the Bedrock for All Security","twitter_description":"Learn why identity is the ideal control plane for securing users and data.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Identity \u2013 the Bedrock for All Security","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"},"wordCount":6,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","articleSection":["Multi-Factor Authentication"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","url":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/","name":"Identitas - Landasan untuk Semua Keamanan - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","datePublished":"2021-04-13T19:06:58+00:00","dateModified":"2023-11-07T22:28:40+00:00","description":"Pelajari mengapa identitas adalah bidang kontrol yang ideal untuk mengamankan pengguna dan data.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-identity-the-bedrock-for-all-security.jpg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/identity-the-bedrock-for-all-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Identity \u2013 the Bedrock for All Security"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solusi Keamanan Siber dan Manajemen Risiko Digital","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/comments?post=2209"}],"version-history":[{"count":4,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2209\/revisions"}],"predecessor-version":[{"id":27167,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/posts\/2209\/revisions\/27167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media\/2210"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/media?parent=2209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/categories?post=2209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/id\/wp-json\/wp\/v2\/tags?post=2209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}