10
EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY AT THE SPEED OF BUSINESS

EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

EBOOK

SECURING USERS IN THE CLOUD: MANAGING IDENTITY AT THE

SPEED OF BUSINESS

Page 2: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

SECURING USERS IN THE CLOUD

Advancements in technology are contributing to unprecedented

business growth and innovation. Cloud computing is at the heart

of this business transformation, and today, more than 90 percent

of businesses use the cloud in some capacity.1

This same cloud technology, though, contributes to an increasing

and troubling decentralization of identity controls – just as

identity is emerging as the major attack vector.

As IT grapples with the complexities of managing identities from

the data center to the cloud, it must find ways to maintain

critical control and visibility of user access – regardless of where

the data stores and applications exist – without compromising

user convenience, and without saying “no” to the apps that

business users rely on to do their jobs.

LEARN HOW INSIDE.

2

Page 3: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

CENTRALIZED IDENTITIES

When a new employee is hired into an organization, IT sets up that

user’s identity credentials in a repository such as Microsoft Active

Directory (AD).

AD provides IT with centralized control and visibility of all of the

organization’s user credentials. It also enables central management

of the policies that define users’ access to corporate systems and

information resources from desktops and other endpoints, including

Virtual Private Networks (VPNs).

Today, modern technologies such as cloud applications are expanding

the organization’s traditional perimeters. While these apps enable

business growth and innovation and provide users with unprecedented

convenience and accessibility, they present IT with a new challenge:

user credentials that are being established outside of the organization

and therefore, outside of IT’s control.

Identity repositories such as

Microsoft AD provide IT with

critical centralized control and

visibility of user credentials.

3

Page 4: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

THE LURE OF THE “ISLANDS”

Popular cloud-based applications such as Dropbox, Salesforce.com,

Skype, Box, and HubSpot are bridging critical gaps for business users

to be more efficient and productive. Users rely on these apps to

collaborate, communicate, or perform specialized functions including

customer relationship management (CRM), marketing, graphics, and

sales.

Cloud applications, though, force users to establish unique usernames

and passwords for each individual application, usually with a distinct

means of authentication.

The result are “Islands of Identity,” so called because users’ credentials

exist in the apps’ individual data stores outside the purview of IT.

Without a bridge to IT, these distributed and disconnected islands

make it impossible for IT to manage or monitor access centrally,

dramatically increasing the possibility of attack.

Credentials for cloud apps are

stored in the app provider’s data

store — outside of IT’s purview.

4

Page 5: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

KNOCK, KNOCK. WHO’S THERE?

While users are focused on the convenience that cloud apps offer, IT

is driven by the need to secure the organization’s data and network

assets.

Underscoring the urgency of this need is the emergence of identity as

the most consequential cyber-attack vector. This places a premium on

ensuring that all user access is secure across all endpoints — the cloud

included.

According to the 2016 Verizon Data Breach Investigations Report,

63% of confirmed breaches involved the use of weak or stolen

credentials.2

Being able to verify that users are who they say they are becomes

more important – and more complicated – in this modern environment.

It’s no wonder that organizations see safeguarding data one as of the

cloud’s biggest challenges.3

The emergence of identity as

the major attack vector makes

it critical to ensure that user

access in the cloud is secure.

5

Page 6: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

A NEW STRATEGY FOR IDENTITY

The numbers and types of cloud apps for business are on the rise and

driving more use. The average organization today uses about 13 cloud

apps.4

As organizations face the confluence of the demand for user

convenience and the need for IT to manage and secure Islands of

Identity without eliminating them, the question remains: Is it possible

to achieve both convenience AND security in today’s complex

technology environment?

The answer is yes.

There IS a way to assure user

identities and provide

convenient and secure access

to your users in the cloud.

6

Page 7: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

MANAGING IDENTITY AT THE SPEED OF BUSINESS

A solution such as RSA SecurID® Access integrates with your

existing security solution to extend your authentication strategy for

on-premises applications and resources to your cloud-based data and

applications.

The result enables IT to manage Islands of Identity effectively, and

more specifically, with better visibility into and control over access —

no matter where the data stores and applications exist.

An award-winning multi-factor authentication solution, RSA SecurID

Access provides a better user experience in which end-user

authentication and access remain convenient and secure. Identity and

access management is frictionless, automated, continuous, and risk-

aware.

The end result? The organization benefits from Business-Driven

Security™. IT no longer has to say “no,” and users are able to access

the apps they need quickly and easily.

Business-Driven Security

becomes a reality with

RSA SecurID Access.

7

Page 8: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

“REIN IN” ACCESS TO THE CLOUD

Visibility and access control are needed to minimize risk to the

business as a whole, and to take full advantage of the cloud model.

As the growth of this technology continues to evolve, make sure your

organization is taking advantage of the cloud’s opportunities, and

minimizing its challenges and risks.

Modern authentication and identity assurance solutions such as RSA

SecurID Access provide identity and access assurance, and offer

multiple convenient and secure ways to authenticate all of your users,

analyze their behavior and context, and automate their levels of your

cloud access — from anywhere and any device.

Start with a security solution that protects your cloud access against

identity threats with convenient AND secure access. Talk with an RSA

security expert today.

VISIT RSA.COM/TRYSECURID TO SIGN UP FOR A FREE TRIAL

8

Enable business users to access

the cloud apps THEY need with

the identity assurance YOU need

to protect your organization.

Page 9: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

REIMAGINE YOUR IDENTITY STRATEGY WITH RSA

RSA offers Business-Driven Security solutions that uniquely link business

context with security incidents to help organizations manage risk and protect

what matters most. RSA solutions are designed to effectively detect and

respond to advanced attacks; manage user identities and access; and reduce

business risk, fraud and cybercrime. RSA protects millions of users around

the world, is a recognized leader in six Gartner Magic Quadrants, and helps

more than 94% of Fortune 500 companies thrive in an uncertain, high-risk

world.

For more information, go to www.rsa.com.

The information in this publication is provided “as is.” Dell Inc. or its subsidiaries make no

representations or warranties of any kind with respect to the information in this publication,

and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.

Use, copying, and distribution of any software described in this publication requires an applicable

software license.

© 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are

trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their

respective owners. Published in the USA, 03/17, Security in the Cloud eBook.

Dell Inc. or its subsidiaries believe the information in this document is accurate as of its

publication date. The information is subject to change without notice.

9

Page 10: EBOOK SECURING USERS IN THE CLOUD: MANAGING IDENTITY …€¦ · Identity and access management is frictionless, automated, continuous, and risk-aware. ... Start with a security solution

References:

1 Datapipe. Overcoming Cloud Security Challenges. David Lucky. May 6, 2016.

2 Verizon. 2016 Verizon Data Breach Investigations Report. 3 eWeek. IT Modernization Presents Opportunities, Risks for Industry Pros. Don Reisinger. January 30, 2017. 4 Web Host Industry Review. Slack May Be Sexier but Office 365 Most Used Cloud- Based Business App. Chris Burt March 29, 2016.

10