identity access management

Conclusion:

Many organisations that were maintaining legacy file-sharing solutions (file share S: drives, etc) together with other less sophisticated technologies such as FTP services and VPNs, were compelled to rethink their file-sharing practices when the pandemic forced employees to work from home.

Retiring such outdated tools is just one of the many steps that can reduce the complexity of accessing files and subsequently reduce the chance of security breaches through more secured platforms.

Conclusion: Organisations are increasingly adopting digital customer strategies and on-line channels. Customer identity management is now a foundation of most customer on-line services. This is both to secure customer identities and provide a single point of access and experience when customers transact across multiple, on-line channels. Many digital identity solutions are less than effective when it comes to striking a balance between adding a layer of safety and ensuring a frictionless customer journey. Adopting a customer focused approach at each stage of the customer journey, customer identity and management systems (CIAMS), user pain-points around identity controls can be prevented through a more user-sensitive, yet risk-aware, approach.

Conclusion:

As organisations flesh out their detection and response strategies, one new area of applicability of this technology deserves serious consideration. The new area is identity detection and response (IDR). Most of the current detection capabilities are clustered around the malicious actor’s activity across the infrastructure. Activities such as lateral movement using networks, system compromise using fileless malware, and even social engineering users to act on the attacker’s behalf.

Yet identity is the holy grail sought out by malicious actors in almost every penetration of a system. It is central to every IT environment. Organisations should examine IDR and assess the visibility it may bring to their detection systems.