29.07.2016 Views

CSLATEST

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

zero trust<br />

THE IMPERATIVE FOR ZERO TRUST<br />

AS ORGANISATIONS EMBRACE DIGITAL TRANSFORMATION TO GAIN ACCESS TO THE CLOUD'S MANY BENEFITS,<br />

COMPUTING ENVIRONMENTS ARE FACED WITH EVOLVING INTO BORDERLESS IT ECOSYSTEMS<br />

As we continue to digitally<br />

transform organisations, so<br />

the importance of secure and<br />

reliable digital identities has grown.<br />

According to Scott Silver, CEO, Integral<br />

Partners, part of the Xalient Group,<br />

2024 is poised to usher in a multitude<br />

of innovations and trends in this area,<br />

ranging from advanced biometrics to<br />

the integration of artificial intelligence<br />

and machine learning to meet the<br />

changing needs of businesses,<br />

individuals and governments.<br />

"As organisations embrace digital<br />

transformation, computing environments<br />

are evolving into borderless IT<br />

ecosystems," he warns. "Digital identities<br />

are also evolving at pace and identity<br />

security is now a crucial aspect of<br />

cybersecurity. 2024 will usher in a<br />

multitude of identity innovations,<br />

ranging from advanced biometrics<br />

to artificial intelligence integration<br />

to meet the needs of businesses,<br />

individuals and governments.<br />

"Increasingly, cybercriminals are<br />

creating synthetic identities by combining<br />

stolen personal information from<br />

several people into a new false identity<br />

that doesn't rely on real person-al data.<br />

"They use these identities to build a<br />

shallow history that passes identity<br />

checks with banks and retailers.<br />

To counter these tactics, biometrics,<br />

such as facial recognition, fingerprint<br />

scanning and voice recognition, are<br />

becoming popular as a stronger means<br />

of identity verification."<br />

Despite these countermeasures,<br />

however, the threat is large and<br />

growing, driven by Cybercrime-as-a-<br />

Service (CaaS) that allows criminals to<br />

procure tools enabling them to easily<br />

carry out identity-based attacks.<br />

"This makes it even more important for<br />

businesses to prioritise identity security,<br />

employing policies and tools that also<br />

monitor employees and prevent insider<br />

incidents."<br />

AI and machine learning are important<br />

tools for organisations seeking to combat<br />

identity risk. "AI-powered pattern and<br />

behaviour recognition capabilities can<br />

identify anomalies and detect fraudulent<br />

attempts in real-time. Machine<br />

learning algorithms act as adaptive<br />

detectives, continuously evolving to<br />

recognise new identity fraud tactics,<br />

enhancing the overall accuracy of the<br />

verification process.<br />

"Zero trust architecture is the<br />

foundation of modern cybersecurity,<br />

with secure networking and identity<br />

security as cornerstones. Zero Trust<br />

involves the application of identity and<br />

access management capabilities to<br />

perform continuous risk assessment<br />

every time resources are accessed. It<br />

uses contextual identity information to<br />

optimise access policies, while enforcing<br />

the principle of least privilege."<br />

Zero Trust controls reduce insiders'<br />

ability to access systems and data that<br />

aren't part of their job, adds Silver.<br />

"Now, organisations are seeking<br />

AI-powered identity and access<br />

management in a single solution that<br />

Scott Silver, CEO, Integral Partners.<br />

integrates seamlessly with zero trust<br />

architecture, combined with professional<br />

support. These solutions enable<br />

fast, effective responses to potential<br />

breaches and, alongside identity, will<br />

play a pivotal role in the evolution of<br />

zero trust models."<br />

Identity is seen as the new enterprise<br />

perimeter, and managing interdependencies<br />

between identity, security and<br />

networking to adhere to true zero trust<br />

principles is a considerable challenge -<br />

one that the Xalient Group is addressing,<br />

he says, as a provider of IAM<br />

services and solutions through its recent<br />

acquisitions of Grabowsky and Integral<br />

Partners. "Together, we can develop the<br />

advanced, AI-powered identity management<br />

solutions that companies need in<br />

today's complex security environment."<br />

www.computingsecurity.co.uk @CSMagAndAwards May/June 2024 computing security<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!