SUBSCRIBE

Identity & access management the focus of Dellโ€™s new security approach

LAS VEGAS โ€“ Cyber-security map of Canada

Interactive map: Which Canadian region spends the most on IT security?

How much of your IT budget should be spent on security? In the face of high-profile data breaches…

Read More

Shutterstock.com

On the rise: Security as a business enabler

Security remains top of mind for organizations across Canada from IT leaders all the way up to the…

Read More

โ€œWeโ€™re bringing all these technologies together: privileged accounts now integrate with the firewall, and two-factor authentication integrates with SonicWall,โ€ said Evans. โ€œWeโ€™re starting to roll out these integration points.โ€

An example of the sort of solutions the integration of Dellโ€™s security portfolio can allow centres around the Dell Security Analytics Engine, which does risk scoring in real time when a user requests access to the corporate network. It notes if youโ€™re logging in from a corporate or non-corporate network, whether youโ€™re using a corporate-approved device, where youโ€™re located, the time of day and more. A risk score is sent to Dell Cloud Access Manager, which can make a real-time authentication decision.

โ€œSo if Iโ€™m logging in Sunday from Las Vegas, it may decide that I have the right user name and password so weโ€™ll implement setup authentication and ask me for a one-time token,โ€ said Evans. โ€œBut if Iโ€™m logging in from 1:00 AM from North Korea, it may lock me out.โ€

The solution uses Dell One Identity Cloud Access Manager, geo location information from SonicWall, Dell Defender for authentication, and a readily available blacklist โ€“ Dell SecureWorks have that integrated. Lockout is a policy decision; administrators set the policies and what happens based on the risk score.

While security is often seen as a priority for the IT department and something to be tolerated by business users, Dell is pitching its I&AM portfolio as a tool for business enablement tool.

โ€œWhen users are burdened with onerous security hurdles theyโ€™ll find a way around it. The ability for this technology to give IT the ability to turn the security knobs up and down in real time is the real benefit,โ€ said Evans. โ€œIf a customer can just use their user name and password nine times out of 10, the one-time 10 they need to use a one-time token theyโ€™ll understand. I&AM is a discipline fueled not just by security, but business efficiency and productivity.โ€

Dell sees a real greenfield opportunity around identity management said Timothy G. Brown, a Dell fellow and executive director for security in the Dell Software group. It took Dell by surprise, but he said the customer lists of the major players in the space, such as IBM, Oracle and CA, donโ€™t extend much below the Fortune 1000. Brown said even many state governments donโ€™t have identity management solutions in place.

โ€œPrivilege management should reach the point of being good security hygiene. You should never give anyone access to your root or your Oracle admin. Itโ€™s bad for them and bad for the company,โ€ said Brown โ€œWeโ€™re seeing a lot more instances of targeted phishing attacks against individuals with this access, and these are the worst attacks in terms of financial loss and damage to the company. And theyโ€™re becoming more common.โ€


Related Download
Securing your network and application infrastructure Part 3: Staying ahead of hackers Sponsor: Fortinet
Securing your network and application infrastructure Part 3: Staying ahead of hackers
Network security challenges are evolving faster than ever as a result of new technologies and application complexity. In addition, many old issues continue to plague organizations, from simple password security to keeping software up-to-date.
Register Now


Tech Jobs

Categories