sb-as logo
Story image

Identity: The new common language of data - and the new security perimeter

04 Dec 2017

According to IT provider Empired, the digital world has opened up a new world of possibilities for enterprise security. Data is no longer bound by four walls and firewalls are now open to business partners, suppliers and cloud services.

Even web-facing consumer cloud services are more vulnerable to hacking than ever, and it is important that organisations move beyond their conventional views, the company says.

“The reality is there are no more boundaries for corporate data. With so many services in so many locations it’s no longer possible to draw a line around the network, which calls into question how to protect it,” explains Empired’s national business manager of cloud design and integration, Jaen Snyman.

“With data stored on-premises, in permitted cloud services, in unknown cloud services, on corporate devices, and on un-managed devices, data has moved beyond the network, which means we need a new security perimeter.” 

Identity could be the new common language of data – or the new control plane. It should also make up the new security perimeter, Empired explains.

Identity is also about who a user is rather than where they are. Digital identities are, in fact, about much more than a simple username and password.

“With identity as the control plane who you are can be used to get access to different data within the organisation whether users are in the office, at home, or somewhere else,” Snyman says.

“Further, using identity provides an additional layer of protection. For example, if an employee usually accesses particular data in the office and is suddenly trying to access this from a different location, this could raise a red flag and prompt the system to ask further questions to verify the identity of the person accessing the data.” 

The company says there are three approaches to identity-driven security.

1.        Protecting the front door: Safeguard resources at the front door with innovative and advanced risk-based conditional accesses.  2.        Providing layered protection: Gain deep visibility into user, app, devices, and data activity on-premises and in the cloud.  3.        Detecting attacks before they cause damage: Uncover suspicious activity and pinpoint threats with deep visibility and ingoing behavioural analytics. 

Story image
Kaspersky announces update to Microsoft Office 365 security solution as COVID-19 threats emerge
The upgrade introduces enhanced anti-phishing capabilities with a dedicated anti-spoofing feature, as well as bolstered protection within Microsoft Teams.More
Story image
D-Link Covr Mesh Wi-Fi System incorporates McAfee protection
As more people start working from home, Wi-Fi blackspots hinder productively and limit the choice of locations in the home for use as an office space. More
Story image
New stalkerware tech wreaking havoc on personal privacy
Stalkerware, which tracks and stalks victims using their own devices, is not a new concept but researchers at Kaspersky have found a new sample of it, which it says supersedes all previously found software. More
Story image
You're virtually invited: How the smartest organisations manage Office 365 and Microsoft Teams
If you’re starting your digital transformation journey or want to find out more about how you can boost your Office 365 productivity, this is your chance to take advantage of expert advice - free.More
Story image
Case study: 40% of password managers vulnerable to breach
Two of five password managers tested by researchers from the University of York were fooled by a fake app into giving away a password.More
Story image
Internet infrastructure strained as demand for servers surges 30%
Internet service providers are extending data caps to meet the newfound reliance on the network, however, some experts express uncertainty concerning internet infrastructure’s ability to keep up with the rapidly growing demand.More