Connect with us

Hi, what are you looking for?

HEADLINES

Centrify eyes to redefine legacy approach to Privileged Access Management

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse.

Dan Mountstephen, Regional Vice President, Asia-Pacific and Japan, Centrify

Data breaches continue to harm enterprises despite installing security solutions. Cyber attackers are logging in using weak or compromised passwords, moving across the network to gain privileged access to steal data and cover their tracks. These are challenges companies are facing today which drive the need for them to be informed about the threats they are infected with and the security technology to secure their infrastructure.

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse. This happens despite spending large amount on IT security and risk management in 2019.      

The National Privacy Commission of the Philippines said 53% of data breaches in the country can be traced to employee negligence against the 47% that is attributed to hackers and cybercriminals.

To help stop the causes of breaches, Centrify has redefined the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise attack surfaces.

Advertisement. Scroll to continue reading.

The Centrify Zero Trust Privilege works by helping customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. The implementation of least privilege access minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. 

Unlike the traditional network model of “trust but verify” which relied on well-defined boundaries, the Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

The Zero Trust Privilege may help organizations reduce the risk of becoming a data breach victim. Enterprises may consider the Privileged Access Management approach by implementing password vaults, leaving gaps that can easily be exploited. Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

Advertisement