Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
EBOOK
SECURING USERS IN THE CLOUD: MANAGING IDENTITY AT THE
SPEED OF BUSINESS
SECURING USERS IN THE CLOUD
Advancements in technology are contributing to unprecedented
business growth and innovation. Cloud computing is at the heart
of this business transformation, and today, more than 90 percent
of businesses use the cloud in some capacity.1
This same cloud technology, though, contributes to an increasing
and troubling decentralization of identity controls – just as
identity is emerging as the major attack vector.
As IT grapples with the complexities of managing identities from
the data center to the cloud, it must find ways to maintain
critical control and visibility of user access – regardless of where
the data stores and applications exist – without compromising
user convenience, and without saying “no” to the apps that
business users rely on to do their jobs.
LEARN HOW INSIDE.
2
CENTRALIZED IDENTITIES
When a new employee is hired into an organization, IT sets up that
user’s identity credentials in a repository such as Microsoft Active
Directory (AD).
AD provides IT with centralized control and visibility of all of the
organization’s user credentials. It also enables central management
of the policies that define users’ access to corporate systems and
information resources from desktops and other endpoints, including
Virtual Private Networks (VPNs).
Today, modern technologies such as cloud applications are expanding
the organization’s traditional perimeters. While these apps enable
business growth and innovation and provide users with unprecedented
convenience and accessibility, they present IT with a new challenge:
user credentials that are being established outside of the organization
and therefore, outside of IT’s control.
Identity repositories such as
Microsoft AD provide IT with
critical centralized control and
visibility of user credentials.
3
THE LURE OF THE “ISLANDS”
Popular cloud-based applications such as Dropbox, Salesforce.com,
Skype, Box, and HubSpot are bridging critical gaps for business users
to be more efficient and productive. Users rely on these apps to
collaborate, communicate, or perform specialized functions including
customer relationship management (CRM), marketing, graphics, and
sales.
Cloud applications, though, force users to establish unique usernames
and passwords for each individual application, usually with a distinct
means of authentication.
The result are “Islands of Identity,” so called because users’ credentials
exist in the apps’ individual data stores outside the purview of IT.
Without a bridge to IT, these distributed and disconnected islands
make it impossible for IT to manage or monitor access centrally,
dramatically increasing the possibility of attack.
Credentials for cloud apps are
stored in the app provider’s data
store — outside of IT’s purview.
4
KNOCK, KNOCK. WHO’S THERE?
While users are focused on the convenience that cloud apps offer, IT
is driven by the need to secure the organization’s data and network
assets.
Underscoring the urgency of this need is the emergence of identity as
the most consequential cyber-attack vector. This places a premium on
ensuring that all user access is secure across all endpoints — the cloud
included.
According to the 2016 Verizon Data Breach Investigations Report,
63% of confirmed breaches involved the use of weak or stolen
credentials.2
Being able to verify that users are who they say they are becomes
more important – and more complicated – in this modern environment.
It’s no wonder that organizations see safeguarding data one as of the
cloud’s biggest challenges.3
The emergence of identity as
the major attack vector makes
it critical to ensure that user
access in the cloud is secure.
5
A NEW STRATEGY FOR IDENTITY
The numbers and types of cloud apps for business are on the rise and
driving more use. The average organization today uses about 13 cloud
apps.4
As organizations face the confluence of the demand for user
convenience and the need for IT to manage and secure Islands of
Identity without eliminating them, the question remains: Is it possible
to achieve both convenience AND security in today’s complex
technology environment?
The answer is yes.
There IS a way to assure user
identities and provide
convenient and secure access
to your users in the cloud.
6
MANAGING IDENTITY AT THE SPEED OF BUSINESS
A solution such as RSA SecurID® Access integrates with your
existing security solution to extend your authentication strategy for
on-premises applications and resources to your cloud-based data and
applications.
The result enables IT to manage Islands of Identity effectively, and
more specifically, with better visibility into and control over access —
no matter where the data stores and applications exist.
An award-winning multi-factor authentication solution, RSA SecurID
Access provides a better user experience in which end-user
authentication and access remain convenient and secure. Identity and
access management is frictionless, automated, continuous, and risk-
aware.
The end result? The organization benefits from Business-Driven
Security™. IT no longer has to say “no,” and users are able to access
the apps they need quickly and easily.
Business-Driven Security
becomes a reality with
RSA SecurID Access.
7
“REIN IN” ACCESS TO THE CLOUD
Visibility and access control are needed to minimize risk to the
business as a whole, and to take full advantage of the cloud model.
As the growth of this technology continues to evolve, make sure your
organization is taking advantage of the cloud’s opportunities, and
minimizing its challenges and risks.
Modern authentication and identity assurance solutions such as RSA
SecurID Access provide identity and access assurance, and offer
multiple convenient and secure ways to authenticate all of your users,
analyze their behavior and context, and automate their levels of your
cloud access — from anywhere and any device.
Start with a security solution that protects your cloud access against
identity threats with convenient AND secure access. Talk with an RSA
security expert today.
VISIT RSA.COM/TRYSECURID TO SIGN UP FOR A FREE TRIAL
8
Enable business users to access
the cloud apps THEY need with
the identity assurance YOU need
to protect your organization.
REIMAGINE YOUR IDENTITY STRATEGY WITH RSA
RSA offers Business-Driven Security solutions that uniquely link business
context with security incidents to help organizations manage risk and protect
what matters most. RSA solutions are designed to effectively detect and
respond to advanced attacks; manage user identities and access; and reduce
business risk, fraud and cybercrime. RSA protects millions of users around
the world, is a recognized leader in six Gartner Magic Quadrants, and helps
more than 94% of Fortune 500 companies thrive in an uncertain, high-risk
world.
For more information, go to www.rsa.com.
The information in this publication is provided “as is.” Dell Inc. or its subsidiaries make no
representations or warranties of any kind with respect to the information in this publication,
and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.
Use, copying, and distribution of any software described in this publication requires an applicable
software license.
© 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are
trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their
respective owners. Published in the USA, 03/17, Security in the Cloud eBook.
Dell Inc. or its subsidiaries believe the information in this document is accurate as of its
publication date. The information is subject to change without notice.
9
References:
1 Datapipe. Overcoming Cloud Security Challenges. David Lucky. May 6, 2016.
2 Verizon. 2016 Verizon Data Breach Investigations Report. 3 eWeek. IT Modernization Presents Opportunities, Risks for Industry Pros. Don Reisinger. January 30, 2017. 4 Web Host Industry Review. Slack May Be Sexier but Office 365 Most Used Cloud- Based Business App. Chris Burt March 29, 2016.
10