Connect with us

Hi, what are you looking for?

HEADLINES

Centrify eyes to redefine legacy approach to Privileged Access Management

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse.

Dan Mountstephen, Regional Vice President, Asia-Pacific and Japan, Centrify

Data breaches continue to harm enterprises despite installing security solutions. Cyber attackers are logging in using weak or compromised passwords, moving across the network to gain privileged access to steal data and cover their tracks. These are challenges companies are facing today which drive the need for them to be informed about the threats they are infected with and the security technology to secure their infrastructure.

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse. This happens despite spending large amount on IT security and risk management in 2019.      

The National Privacy Commission of the Philippines said 53% of data breaches in the country can be traced to employee negligence against the 47% that is attributed to hackers and cybercriminals.

To help stop the causes of breaches, Centrify has redefined the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise attack surfaces.

Advertisement. Scroll to continue reading.

The Centrify Zero Trust Privilege works by helping customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. The implementation of least privilege access minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. 

Unlike the traditional network model of “trust but verify” which relied on well-defined boundaries, the Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

The Zero Trust Privilege may help organizations reduce the risk of becoming a data breach victim. Enterprises may consider the Privileged Access Management approach by implementing password vaults, leaving gaps that can easily be exploited. Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In rigorous evaluations conducted by prestigious cybersecurity testing organizations, Kaspersky Plus (starting in Q4 2024, Kaspersky Premium), Kaspersky Endpoint Security for Business (KESB), and...

HEADLINES

"Given the Philippines' high exposure to cyber threats, it's important for both individuals and businesses to stay vigilant," said Adrian Hia, Managing Director for...

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

Advertisement