Connect with us

Hi, what are you looking for?

HEADLINES

Centrify eyes to redefine legacy approach to Privileged Access Management

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse.

Dan Mountstephen, Regional Vice President, Asia-Pacific and Japan, Centrify

Data breaches continue to harm enterprises despite installing security solutions. Cyber attackers are logging in using weak or compromised passwords, moving across the network to gain privileged access to steal data and cover their tracks. These are challenges companies are facing today which drive the need for them to be informed about the threats they are infected with and the security technology to secure their infrastructure.

A study conducted by Centrify, a cloud-ready Zero Trust Privilege provider, showed that 66% of organizations are still getting breached on an average of five times or more a year as the attack surface continues to increase. Privilege abuse is the leading cause of data breach where 80% of breaches involve privileged credential misuse. This happens despite spending large amount on IT security and risk management in 2019.      

The National Privacy Commission of the Philippines said 53% of data breaches in the country can be traced to employee negligence against the 47% that is attributed to hackers and cybercriminals.

To help stop the causes of breaches, Centrify has redefined the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise attack surfaces.

Advertisement. Scroll to continue reading.

The Centrify Zero Trust Privilege works by helping customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. The implementation of least privilege access minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. 

Unlike the traditional network model of “trust but verify” which relied on well-defined boundaries, the Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

The Zero Trust Privilege may help organizations reduce the risk of becoming a data breach victim. Enterprises may consider the Privileged Access Management approach by implementing password vaults, leaving gaps that can easily be exploited. Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement