fpo breach vs spend less than 10% spending is on identity5 “stop the breach: reduce the likelihood...
TRANSCRIPT
50%
ARE YOU NEGLECTING SECURE ACCESS TO APPS AND ENDPOINTS?Weak or stolen passwords are the main culprit of the unending barrage of today’s breaches. Given the sheer number of passwords used to access all those apps and endpoints, the value of what they gatekeep and their susceptibility to misuse, you have to ask yourself: Are you prepared to avert a password crisis for your company?
WHY IDENTITY MATTERS
IDENTITY MATURITY REDUCES ACCESS RISK
SSO everywhere End password sprawl with a single identity across all apps and endpoints
Validate the device Allow access to apps from secure and trusted endpoints
Increasing your company’s IAM maturity reduces your risk of a breach by
Adaptive MFA Step up authentication or block access when risky behavior is detected
Audit everything Capture all access events across apps, endpoints and infrastructure to identify and flag high-risk events
Enforce least privilege Grant just enough privilege for each user to perform their tasks
FPO BREACH VS SPEND
of data traffic will bypass perimeter security by 2021– Gartner3
more breaches involve identity vs. vulnerabilities2 10X
Average person has
discrete online logins427
4WHY ACCESS IS SO HARD TO CONTROL
IDENTITY IS THE TOP ATTACK VECTOR,
YET SECURITY SPEND IS ELSEWHERE
Password proliferation increases risk exposure.
SaaS apps and BYO devices keep IT in the dark.
VPNs grant too much access to internal resources.
SECURITY’SPASS
WORDCRISIS
CLOUD ADOPTION BLOWS AWAY THE PERIMETER3
5
Start with a ZERO TRUSTapproach to IAM:
Perimeters don’t work when hackers have keys to the front door.
Traditional Identity and Access Management (IAM) solutions don’t address modern challenges.
of security spending is on identity110%
less than
DOWNLOAD THE FULL eBOOKSecurity’s Password Crisis to learn more about what your company can do to adopt Zero Trust Security.
1 “Verizon Data Breach Investigations Report,” Verizon Enterprise. October 2017.2 “Forecast: Information Security, Worldwide, 2015–2021, 2Q17 Update,” Gartner. 2017.3 “Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge,”
David O’Leary, Rich Zimmerman, Anne Grahn, David Poarch, Matt Cook, John Pirc, Forsythe Focus. July 12, 2017.
4 “Survey Says: People Have Way Too Many Passwords To Remember,” Joseph Bernstein, BuzzFeed. May 2016.
5 “Stop the Breach: Reduce the Likelihood of an Attack through an IAM Maturity Model,” Forrester Consulting. February 2017.