Zero Trust: Solving IT Security’s Identity Crisis
- LANGUAGE: English DATE: Thursday, May 03, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.
Instead, in times when the corporate security perimeter has almost disappeared, they should concentrate on rethinking their core defenses by maturing their identity and access management strategies to secure applications, devices, data, and infrastructure — both on-premises and in the cloud. This reflects a common misperception in the industry of the real attack vectors and illustrates the “identity crisis” that IT security faces.
Organizations need to recognize that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats from both external and internal malicious actors. Until IT professionals start implementing identity-centric security measures, account credentials will remain the largest unprotected attack surface for data breaches.
This webinar outlines an entirely new approach — Zero Trust Security. This paradigm assumes that nothing in your corporate IT infrastructure — including users, endpoints, networks, and resources — is ever trusted, and each interaction must be verified to decrease the chance of a security breach. Zero Trust Security ensures secure access to resources while significantly reducing the possibility of access by bad actors.
Join this KuppingerCole webinar to:
- Learn about Zero Trust Security and the reasons for a paradigm shift;
- Understand the four essential pillars of Zero Trust Security in the context of Next-Generation Access;
- Learn how to evaluate your organization’s current Zero Trust Security posture against a best practices maturity model;
- Develop a Zero Trust Security implementation strategy for your organization to secure access to resources while significantly reducing the possibility of compromise by bad actors.
In the first part of the webinar, Paul Simmonds, Fellow Analyst at KuppingerCole, will tap into his former experience as a global CISO and explain why organizations often ignore identity and credential-based threats when it comes to developing an effective cyber defense strategy.
In the second part, Dr. Torsten George, Product Evangelist at Centrify, will provide an overview of the Zero Trust Security model and outline a step-by-step plan on how to implement it in your organization.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!