NGA

Predicting The Future Of Next-Gen Access And Zero Trust Security In 2019
By Louis Columbus on January 21, 2019
Bottom Line: The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognizing that identities are the new security perimeter. The faster any digital business is growing, the more identities, […]
Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Behavior-based scoring algorithms, cybersecurity, enterprise IT security, Idaptive, Louis Columbus' blog, Multi-Factor Authentication (MFA), Next-Gen Access, NGA, Single Sign-On (SSO), Zero Trust Security, ZTS

Zero Trust Security Update From The SecurIT Zero Trust Summit
By Louis Columbus on July 12, 2018
Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. 53% of enterprises feel they are more susceptible to threats since 2015. 51% of enterprises suffered at least one breach in the past 12 months and malicious insider incidents increased 11% year-over-year. These […]
Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, CIO, CSO, cybersecurity, machine-learning based security, Next-Gen Access, NGA, Zero Trust Security, ZTS

Analytics Are Empowering Next-Gen Access And Zero Trust Security
By Louis Columbus on July 1, 2018
Employee identities are the new security perimeter of any business.
80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe.
Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, Centrify Analytics Service, Next-Gen Access, NGA, Verizon Mobile Security Index 2018 Report, Zero Trust Security