Forget About the Coming AI Apocalypse. We have Bigger Fish to Fry. How Did Tax Day Work Out for You?

Forget About the Coming AI Apocalypse. We have Bigger Fish to Fry. How Did Tax Day Work Out for You?

Our government computer systems are so old they crash when Americans try to file their taxes. Worried about North Korea? Worry more about the senile machines launching our missiles. Houston we have a problem. AI will take our jobs. Google and Facebook will take our
Apcela

Fulfilling the promise of UCaaS requires a better network

UCaaS Systems Unified communications (UC), by combining voice, video and text messaging into a single system, has long promised efficiency and convenience for communicating with co-workers and customers. Why are the promises not always fulfilled? For a long time, integration of hardware-based systems into the

Bottom Line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses.

The era of Zero Trust Security is here, accelerated by NGA solutions and driven by the needs of digital businesses for security strategies that can keep up with the rapidly expanding perimeters of their businesses. Internet of Things (IoT) networks and the sensors that comprise them are proliferating network endpoints and extending the perimeters of growing businesses quickly.

Inherent in the DNA of Next-Gen Access is the ability to verify the user, validate the device (including any sensor connected to an IoT network), limit access and privilege, then learn and adapt using machine learning techniques to streamline the user experience while granting access to approved accounts and resources. Many digital businesses today rely on IoT-based networks to connect with suppliers, channels, service providers and customers and gain valuable data they use to grow their businesses. Next-Gen Access solutions including those from Centrify are enabling Zero Trust Security strategies that scale to secure the perimeters of growing businesses without interrupting growth.

How Zero Trust Security Fuels New Business Growth  

The greater the complexity, scale and growth potential of any new digital business, the more critical NGA becomes for enabling ZTS to scale and protect its expanding perimeters. One of the most valuable ways NGA enables ZTS is using machine learning to learn and adapt to users’ system access behaviors continuously. Insights gained from NGA strengthen ZTS frameworks, enabling them to make the following contributions to new business growth:

  1. Zero Trust Security prevents data breaches that cripple new digital business models and ventures just beginning to scale and grow. Verifying, validating, learning and adapting to every user’s access attempts and then quantifying their behavior in a risk score is at the core of Next-Gen Access’ DNA. The risk scores quantify the relative levels of trust for each system user and determine what, if any, additional authentication is needed before access is granted to requested resources. Risk scores are continuously updated with every access attempt, making authentication less intrusive over time while greatly reducing compromised credential attacks.
  2. Securing the expanding endpoints and perimeters of a digital business using NGA frees IT and senior management up to focus more on growing the business. In any growing digital business, there’s an exponential increase in the number of endpoints being created, rapidly expanding the global perimeter of the business. The greater the number of endpoints and the broader the perimeter, the more revenue potential there is. Relying on Next-Gen Access to scale ZTS across all endpoints saves valuable IT time that can be dedicated to direct revenue-producing projects and initiatives. And by relying on NGA as the trust engine that enables ZTS, senior management will have far fewer security-related emergencies, interruptions, and special projects and can dedicate more time to growing the business. A ZTS framework also centralizes security management across a digital business, alleviating the costly, time-consuming task of continually installing patches and updates.
  3. Zero Trust Security is enabling digital businesses globally to meet and exceed General Data Protection Regulation (GDPR) compliance requirements while protecting and growing their most valuable asset: customer trust. Every week brings new announcements of security breaches at many of the world’s most well-known companies. Quick stats on users affected, potential dollar loss to the company and the all-too-common 800 numbers for credit bureaus seem to be in every press release. What’s missing is the incalculable, unquantifiable cost of lost customer value and the millions of hours customers waste trying to avert financial chaos. In response to the need for greater oversight of how organizations respond to breaches and manage data security, the European Union (EU) launched General Data Protection Regulation (GDPR) which goes into effect May 25, 2018. GDPR applies not only European organizations, but also to foreign businesses that offer goods or services in the European Union (EU) or monitor the behavior of individuals in the EU. The compliance directive also states that organizations need to process data so in a way that “ensures appropriate security of the personal data, using appropriate technical and organizational measures,” taking into account “state of the art and the costs of implementation.”

Using an NGA approach that includes risk-based multi-factor authentication (MFA) to evaluate every login combined with the least privilege approach across an entire organization is a first step towards excelling at GDPR compliance. Zero Trust Security provides every organization needing to comply with GDPR a solid roadmap of how to meet and exceed the initiative’s requirements and grow customer trust as a result.

Conclusion

Next-Gen Access enables Zero Trust Security strategies to scale and flex as a growing business expands. In the fastest growing businesses, endpoints are proliferating as new customers are gained, and suppliers are brought onboard. NGA ensures growth continues uninterrupted, helping to thwart comprised credential attacks, which make up 81% of all hacking-related data breaches, according to Verizon.

By Louis Columbus

Louis Columbus

I am currently serving as Director, Global Cloud Product Management at Ingram Cloud. Previous positions include product marketing at iBASEt, Plex Systems, senior analyst at AMR Research (now Gartner), marketing and business development at Cincom Systems, Ingram Micro, a SaaS start-up and at hardware companies. I am also a member of the Enterprise Irregulars. My background includes marketing, product management, sales and industry analyst roles in the enterprise software and IT industries. My academic background includes an MBA from Pepperdine University and completion of the Strategic Marketing Management Program at the Stanford University Graduate School of Business. I teach MBA courses in international business, global competitive strategies, international market research, and capstone courses in strategic planning and market research. I've taught at California State University, Fullerton: University of California, Irvine; Marymount University, and Webster University. You can reach me on Twitter at @LouisColumbus.

View Website

TOP ARCHIVES

Technology Cloud Contributor

The Competitive Cloud Data Center

The Competitive Cloud The corporate data center was long the defacto vehicle for all application deployment across an enterprise. Whether ...
How Blockchain Could Be The Solution To Many of the Problems in Healthcare

How Blockchain Could Be The Solution To Many of the Problems in Healthcare

Blockchain Can Solve Many Healthcare Problems Emma decides to see a primary care physician after she witnesses a series of ...
What We Can Learn about AI and Creating Smart Products from “The Incredibles”

What We Can Learn about AI and Creating Smart Products from “The Incredibles”

Creating Smart Products from “The Incredibles” Nothing strikes terror into the hearts of humans more than the idea of an ...
Using Machine Learning To Find Employees Who Can Scale With Your Business

Using Machine Learning To Find Employees Who Can Scale With Your Business

Machine Learning To Find Employees Hiring managers in search of qualified job candidates who can scale with and contribute to ...
3 Ways How AI Will Augment the Human Workforce

3 Ways How AI Will Augment the Human Workforce

The question in the AI market is no longer about whether AI can affect the workplace and the human workforce ...
Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare and Medicaid Services (CMS). The #1 reason for failure is the absence of a full-spectrum healthcare risk assessment. These assessments ...
Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), "worldwide revenues for big data and business analytics will grow ...
Why Marketing Is Important - Building A Solid Digital Foundation

Why Marketing Is Important – Building A Solid Digital Foundation

Why Marketing Is Important Those who ask themselves why marketing is important. Lets first start with Big Data. Big Data and its enhanced usefulness through advancing predictive analytics has changed the marketing game forever, and with technology evolving and expanding ...

Cloud Community Supporters

(ISC)²
AWS
HPE
CA Technologies
Cisco

Cloud community support comes from sponsorship, service opportunities and collaborative network partnership initiatives.