02.03.2019 Views

Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Five Things You Need to Know<br />

About Next-Gen Authentication<br />

By Dana Tamir, VP Market Strategy at Silverfort<br />

Currently four out of five breaches<br />

involve the use of compromised<br />

or weak credentials. Enforcing<br />

multi-factor authentication<br />

(MFA) has been proven as the<br />

most effective measure against<br />

these attacks. Yet mainstream<br />

MFA solutions, that were<br />

designed to be implemented for<br />

specific systems, make it difficult<br />

to protect many resources in<br />

today’s complex and dynamic<br />

networks.<br />

The next generation of<br />

authentication introduces<br />

a new approach to enable<br />

seamless MFA that can protect<br />

any organizational resource, no<br />

matter what it is, or where it is. It<br />

no longer requires deployment<br />

of software agents on protected<br />

systems, or proxies in the<br />

network, enabling organizations<br />

to protect any sensitive resource<br />

on-premises or in the cloud with<br />

a holistic adaptive authentication<br />

approach.<br />

Here are five things you need<br />

to know about Next-Gen<br />

Authentication:<br />

1. It’s easier to deploy and<br />

maintain: Since it doesn’t require<br />

deployment of software agents or<br />

network proxies, the deployment<br />

is very quick (typically hours)<br />

even in large complex networks.<br />

In addition, there is no need<br />

to patch or update agents<br />

on protected systems which<br />

minimizes ongoing maintenance.<br />

2. It can protect systems<br />

you couldn’t protect until today:<br />

Many sensitive systems aren’t<br />

supported by mainstream MFA<br />

solutions including proprietary,<br />

homegrown and legacy systems,<br />

IoT and critical infrastructure.<br />

With an agentless, proxy-less<br />

approach, for the first time it’s<br />

possible to protect these systems<br />

without any special or costly<br />

customizations.<br />

3. It unifies protection<br />

across on-premises and cloud<br />

environments: The holistic<br />

nature of the agentless approach<br />

enables you to unify MFA<br />

management and consolidate<br />

auditing across all sensitive<br />

systems, regardless of their<br />

location.<br />

4. It continuously adapts<br />

to risk levels: By continuously<br />

monitoring and analyzing<br />

all access requests, across<br />

on-premises and cloud<br />

environments, it leverages an<br />

advanced AI-Driven risk-engine<br />

to dynamically calculate the<br />

most accurate risk-score per<br />

user, device and resource, and<br />

can automatically step-up<br />

authentication requirements<br />

when risk levels are high.<br />

5. It improves security<br />

while reducing disruptions:<br />

Until now, threats detected<br />

by security solutions weren’t<br />

blocked because false-positive<br />

alerts could result in unwanted<br />

disruptions to legitimate users.<br />

Next generation authentication<br />

enables you to trigger stepup<br />

authentication in response<br />

to detected threats, allowing<br />

legitimate users to authenticate<br />

and continue working while<br />

blocking true-positives.<br />

With identity-based attacks<br />

on the rise, can you afford to<br />

leave your mission critical<br />

resources unprotected? Next-<br />

Gen Authentication opens a new<br />

chapter in enterprise security,<br />

offering organizations a new way<br />

to protect more systems than<br />

ever before, with less effort and<br />

disruptions.<br />

Dana Tamir, VP Market Strategy<br />

at Silverfort<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong> 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!