Story image

Identity: The new common language of data - and the new security perimeter

04 Dec 2017

According to IT provider Empired, the digital world has opened up a new world of possibilities for enterprise security. Data is no longer bound by four walls and firewalls are now open to business partners, suppliers and cloud services.

Even web-facing consumer cloud services are more vulnerable to hacking than ever, and it is important that organisations move beyond their conventional views, the company says.

“The reality is there are no more boundaries for corporate data. With so many services in so many locations it’s no longer possible to draw a line around the network, which calls into question how to protect it,” explains Empired’s national business manager of cloud design and integration, Jaen Snyman.

“With data stored on-premises, in permitted cloud services, in unknown cloud services, on corporate devices, and on un-managed devices, data has moved beyond the network, which means we need a new security perimeter.” 

Identity could be the new common language of data – or the new control plane. It should also make up the new security perimeter, Empired explains.

Identity is also about who a user is rather than where they are. Digital identities are, in fact, about much more than a simple username and password.

“With identity as the control plane who you are can be used to get access to different data within the organisation whether users are in the office, at home, or somewhere else,” Snyman says.

“Further, using identity provides an additional layer of protection. For example, if an employee usually accesses particular data in the office and is suddenly trying to access this from a different location, this could raise a red flag and prompt the system to ask further questions to verify the identity of the person accessing the data.” 

The company says there are three approaches to identity-driven security.

1.        Protecting the front door: Safeguard resources at the front door with innovative and advanced risk-based conditional accesses. 
2.        Providing layered protection: Gain deep visibility into user, app, devices, and data activity on-premises and in the cloud. 
3.        Detecting attacks before they cause damage: Uncover suspicious activity and pinpoint threats with deep visibility and ingoing behavioural analytics. 

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Red Box gains compliance boost with new partnership
By partnering with Global Relay, voice platform provider Red Box is improving the security of its offerings for high-value and risk voice data.