www.marcommit.nlwww.whizpr.nlProgressCommunications.eu
www.deepr.nlINFLUX PRProgressCommunications.eu

x.com/ictberichten
Datum: (19 jaar en 22 dagen geleden)

IDENTITY MANAGEMENT - THE GROWING CHALLENGE

By Ian Kilpatrick, chairman Wick Hill Group, specialists in secure infrastructure solutions

Identity management is a security issue which is becoming increasingly challenging as the perimeter of the network crumbles. This is well illustrated by the DTI Information Security Breaches Survey of 2006, which shows that one in five larger businesses had a security breach associated with weaknesses in their identity management, with the number of incidents being less for smaller companies.

The survey found that incidents were from staff gaining unauthorised access to data, staff obtaining and misusing confidential information, financial theft or fraud, and impersonation or phishing attacks. While the incidence of fraud was low, the impact was greater than for any other type of security incident. Several small businesses lost between £10,000 and £50,000 as a result of fraud and one large bank lost millions.

Identity management has been a problem for many years, but recent changes to the security landscape have made the risks greater. The growth of mobile computing and remote access are important factors. Couple this with the rapid rise of wireless and the growth in access to applications, then you have significantly increased the opportunities for unauthorised access into your network.

At the same time, the internal threat of staff gaining access to confidential information remains as high as ever. Alongside this, the range of potential breaches has materially increased with problems such as pharming, phishing, spyware, keyboard logging, war-driving, etc. on the increase.

A number of issues arise in this new landscape. How do you ensure that users activate security features when they connect to the Internet? How do you get them to protect confidential information and guard against threats such as spyware? And not least, how do you manage access to their machines by other colleagues, family or friends.

This is a challenging picture and the continued reliance on weak single-factor authentication looks increasingly ostrich-like. The DTI 2006 survey found that some 96% of large companies and 93% of all companies are still using single factor authentication to authenticate users.

There isn't a single answer to resolving these problems, but a number of options. There is one thing, however, which is certain - single factor authentication (passwords) is not enough.

There are a number of authentication options:
- single sign-on is a step forward, but requires superior identity management

- two-factor authentication is much better and involves the user of authentication tokens, biometric devices, etc.

- three factor authentication is far superior and involves something you know (e.g. password), something you have (e.g. authentication token) and something you use (e.g. device authentication)

Identity Trust Management is another key step in identity management. It's about managing and trusting the identity of the person, as well as the device, accessing the network. It's about protecting against someone acquiring the name and identity of the normal machine user, as well as ensuring that the device requiring network access complies with company security policies. You need to be sure the device is free of any unauthorised applications such as IM, peer-to-peer or Skype, and that it is secured against current threats.

There are many components to meeting this challenge. Endpoint security systems are part of the solution. With growing numbers of remote and mobile users, EPS systems can secure those accessing the network and ensure, for example, that security policies are actually implemented on individual devices. There is a significant growth of interest in this area and a range of solutions from companies such as Check Point, Cisco, Symantec and Skyrecon is available.

Some EPS solutions enable you to decide which level of access to provide, based on the current level of security of the user's machine, as well as ensuring that all wireless is encrypted and that USB downloads are managed. EPS can move organisations from weak policy statements to active policy delivery and enforcement.

Physical device authentication (as part of a multi-factor authentication approach) is another powerful component. There are solutions which ensure that the device accessing the network is the one that is authenticated. This provides a useful defence against many of the current methods of identity theft. Remotely stealing log-in details doesn't work if you have to be on the authorised device. Similarly, there are SIM identification methods for other mobile devices.

These are all steps on the longer road to identity trust management, where the overall level of access that you provide is based on trust in the authentication and the current level of security, of both the user and the device, coupled with location-based rules.

ENDS

For further press information, please contact Annabelle Brown on 0191 252 8548, email a_brown@dial.pipex.com. For reader queries, please contact Wick Hill on 01483 227600, web www.wickhill.com.  

Bio
Ian Kilpatrick is chairman of Wick Hill Group plc, specialists in secure infrastructure solutions. Kilpatrick has been involved with the Group for 30 years and is the moving force behind its dynamic growth. Wick Hill is an international organisation supplying most of the Time Top 1000 companies through a network of accredited resellers.

Kilpatrick has an in-depth experience of computing with a strong vision of the future in IT. He looks at computing from a business point-of-view and his approach reflects his philosophy that business benefits and ease-of-use are key factors in IT. He has had numerous articles published in the UK and overseas press, as well as being a regular speaker at IT exhibitions.

Verstreken tijd: 19 jaar en 22 dagen

Marcommit is hét full service B2B marketing bureau van Nederland! Wij helpen jouw bedrijf met offline en online marketing campagnes die écht werken.
 Spotlight  
Logo Heliview Conferences & Training
Logo Luminis International B.V.
Logo BTG
Logo NeuroCluster.ai
Logo ID Control
Logo UFI.EU
Logo The Factory
Logo Macanta
Logo Keuze.nl BV
Logo Alleo
Logo Reflex Online BV
Logo LocatieRapport
Logo Stromma Nederland
Logo Spryng
Logo Axini
Logo TechOutlet
Logo Web Wings
Logo TechOutlet
Logo TechOutlet
Logo ID Control
Logo TechOutlet
Logo Networking4ALL
Logo Networking4ALL
Logo TechOutlet
Logo Keuze.nl BV
Logo TechOutlet
Logo Twenty Four Webvertising
Logo Vlirdens
Logo TechOutlet
Logo Facilitor
Logo Clarity Amsterdam
Logo Dynatrace
Logo Protime BV
Logo Mollie
Logo Lightspeed
Logo Awareways
Logo Proofpoint
Logo Schneider Electric
Logo Carly
Logo Unit4
Logo NIRPA
Logo Databricks
Logo reev
Logo Vultr
Logo Fellowmind
TARIEVEN
• Publicatie eenmalig €49

PUBLICATIEBUNDELS
6 voor €199
12 voor €349
Onbeperkt €499

EENMALIG PLAATSEN
Persbericht aanleveren

REGELMATIG PLAATSEN
Bedrijfsabonnement
CONTACT
Persberichten.com
JMInternet
Kuyperstraat 48
7942 BR Meppel
Nederland
info@persberichten.com
KvK 54178096

VOLGEN
@ICTBERICHTEN

ZOEKEN
IT bedrijf
IT PR-bureau
OVER ONS
Persberichten.com, hét platform voor IT/Tech persberichten

DATABASE
101481 persberichten
6846 bedrijfsprofielen
57 PR-bureauprofielen
15819 tags

KENMERKEN
• Behouden tekstopmaak
• Foto/illustratie/logo
• Downloadbare bijlages
• Profiel met socials
 
www.marcommit.nlwww.whizpr.nlProgressCommunications.eu
www.deepr.nlwww.deepr.nlwww.deepr.nl