Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Identity defined security the next priority

Ping Identity : 20 July, 2015  (Special Report)
Clare Rees of Ping Identity examines social media trends in IT security and why identity defines security should be the next priority.
Identity defined security the next priority

Infosecurity Europe has flourished to become a major showcase of products and services defining the trends and issues in the IT security market. This year, many took to Twitter to voice their opinions on the most popular topics and industry trends, with ‘cloud’ ‘cyber security’ and ‘threats’ receiving the largest amount of mentions on social media.  But what does this tell us about the modern-day information security industry and how best can we prepare ourselves to combat the latest spate of hacks and vulnerabilities?

It should come as no surprise that ‘cyber security’ featured so highly on the Infosecurity 2015 agenda, with the term receiving 485 mentions on Twitter leading up to and during the three-day event. Incident response, breaches, ‘invisible attacks’- all of these fall under the ‘cyber security’ umbrella and the mine field that businesses have to go through to protect their employees, let alone their customers from the modern-day cyber threat, shouldn’t be underestimated.

Furthermore, it was interesting to see ‘cloud’ dominate the Twitter discussion. With the emergence of cloud technologies and the Internet of Things (IoT), our information is being stored and accessed in new, innovative and flexible ways. Yet, with the ever increasing emergence of cloud technologies, how we authenticate using a variety of devices will be a crucial consideration for application security in the coming year. Serious discussions on how we secure identity amidst IoT should be a key talking point, not just for Infosecurity 2016, but for technology companies and CIOs across the country.

The age of identity

Passwords are simply no longer fit for purpose. We find ourselves in a world where hackers are growing ever-more sophisticated in their methods and consumers are becoming more frustrated with juggling multiple passwords for multiple devices. This frustration isn’t misplaced- new and innovative ways of ensuring secure and frictionless access to devices and websites is needed to help combat modern cybercrime and to satisfy consumers in the age of customer demand. The next generation of authentication must be multi-factored and tailored to the user and security must be thoroughly ‘identity defined’.

Identity is at the heart of security- never has this been made so prevalent than through the recent developments in biometric technologies such a fingerprint scans, heartbeats sensors and voice recognition. Putting identity first enables more fluid, trusted interactions between the various applications we access such as Facebook or email. From a business perspective, identity defined security ensures that only the most trusted employees, customers and stakeholders can access the right applications using any trusted device.

Identity defined security can solve the most complex  security challenges as many businesses move to the cloud, adopting mobile business models and preparing for IoT goals. For businesses to stay ahead of the competition, they need to recognise that traditional enterprise security is a thing of the past. Designed to put a wall up around users and to keep ‘the bad guys out’, traditional security models have been utterly disrupted by the advent of cloud and IoT technology. Put in the simplest of terms: identity defined security is one of the evolutions in identity access management that solves difficult enterprise challenges presented by cloud, API and growing mobile working trends.

The technology industry at large is making great strides in upping its game when it comes to building authentication platforms that centre on the identity of the user: take the AppleWatch for example. Ping Identity software ‘PingID’ is now available to provide authentication access to applications via the AppleWatch. We hope to see more software available that integrates with, and allows authentication from, a whole range of devices made by the leaders of the technology sector. This will then encourage change amongst businesses and IT departments across the country. It’s all about educating the community that identity defined security is the future, and we hope to see this trending at next year’s Infosecurity Exhibition.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo