Modern Identity and Access Security – Keeping the Good Guys In and the Bad Guys Out
madhav
Tue, 06/06/2023 – 07:27
Regarding identity and access, it’s becoming harder and harder, if not impossible, to distinguish the “good guys” from the “bad guys.” Organizations must adapt to the evolving risk and threat environment to protect their valuable and sensitive assets. Access security and authentication play an important role. However, organizations face many challenges preventing them from mitigating expanding threats against identity theft.
How do we support expanding user authentication journeys while balancing strong security with a smooth user experience?
Why is there a need for a different approach to user authentication?
If there is one lesson we all learned from the volatile pandemic period, it is the ability to adapt to a changing environment. Adaptability is what separates businesses that thrive from those that are still struggling to survive while working remotely. Surveys indicate that two-thirds of global enterprises will continue to support work-from-home arrangements for the foreseeable future. In addition, according to a Gartner report, by the end of 2024, the change in the nature of work will increase the total available remote worker market to 60% of all employees.
Hybrid working environments will continue to create further security challenges. Part of the threat is that in today’s attack landscape, the identities of remote users have become a lucrative target. Cybercriminals are looking for the weakest link to get into a corporate network. Once inside, they will elevate privileges of the compromised identity to take control of other accounts and either ex-filtrate sensitive data or disrupt operations.
Also, we are witnessing an increasingly diverse type of employee. There are users accessing on-premises data from their homes using their private laptops. Others may access data through a cloud app using the corporate network and laptop, while their colleagues could log onto services via an insecure Wi-Fi network in an airport through their mobile phones.
How can you accommodate all these different authentication requests using a monolithic approach to access security?
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from Thales CPL Blog Feed
Read the original article:
Read the original article: