{"id":231783,"date":"2017-08-02T07:42:50","date_gmt":"2017-08-02T11:42:50","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/authentication-and-it-ecosystem-leveraging-data-from-multiple-sources-cso-online.php"},"modified":"2017-08-02T07:42:50","modified_gmt":"2017-08-02T11:42:50","slug":"authentication-and-it-ecosystem-leveraging-data-from-multiple-sources-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/authentication-and-it-ecosystem-leveraging-data-from-multiple-sources-cso-online.php","title":{"rendered":"Authentication and IT Ecosystem: Leveraging Data from Multiple Sources &#8211; CSO Online"},"content":{"rendered":"<p><p>    sponsored  <\/p>\n<p>      Your immediate IT ecosystem is just one part of the broader      IT ecosystem  and therefore just one source of information      that can be used to authenticate identities and grant access      to systems. From your threat detection system to your      organizations physical security systems, there are a variety      of sources of data that can provide insights into identity      assurance. When building out your identity assurance      strategy, its worthwhile to look at the system management      and security tools in the broader ecosystem and ask yourself:      What information from these sources do I wish our identity      system knew?    <\/p>\n<p>      Here are a few examples of how you can apply data from a      variety of sources for authentication and access purposes.    <\/p>\n<p>      1. Threat Detection       Including SIEM and CASB    <\/p>\n<p>      We all know that identity assurance systems can feed log      information to threat detection systems -- like Security      Information and Event Management (SIEM) and Cloud Access      Security Brokers (CASB) systems -- to help identify threats.      In hand, SIEM and CASB systems can send threat alerts to      identity assurance systems to step up authentication      requirements. For example, when an alert is raised for a      specific user, the identity system can adjust in response by      requiring multi-factor authentication or, if the threat is      significant, blocking access for the user until the threat is      cleared. Similarly, if an alert is raised on a resource,      anyone attempting access to that resource should be required      to provide a higher level of assurance to get it. Again, in      extreme cases, all access to a resource may need to be      blocked.    <\/p>\n<p>      The value of threat alerts from threat detection systems,      whether raised on users or resources, lies in triggering the      appropriate additional access security in real time. In      addition to real-time threat information, many threat      detection tools also offer additional risk analysis. This      data should work with the risk analytics of the identity      assurance system to raise or lower confidence in the users      identity.    <\/p>\n<p>      2. Enterprise Mobility      Management (EMM)    <\/p>\n<p>      Mobile devices that are managed through a corporate EMM have      a wealth of device data available for strengthening identity      assurance. This device information can provide additional      context for static rules, such as policies that foster easier      access for users of corporate managed devices. It can also      provide additional analytics insights to the identity risk      engine.    <\/p>\n<p>      3. Physical Security      Systems    <\/p>\n<p>      Information about how people physically access buildings may      not appear to have much of an impact on how they access      digital information, but in reality, building access data can      instill confidence that a user is who he or she claims to be.      Integrating data from physical access systems into the      identity risk engine extends identity insights. For example,      if a user badges into an office in San Francisco and then,      within a few minutes, attempts a login from London, thats a      clear signal to reassess the identity risk. Conversely, if      the user enters the building he or she normally does and,      following day-to-day patterns, accesses Office 365, that      behavior is also worth considering in determining whether      additional authentication is required.    <\/p>\n<p>      Threat detection, EMM and physical security systems are by no      means the only systems from which additional data about users      can help feed behavioral recognition and static policy rules.      By looking throughout your organization for systems that      contain data to increase identity assurance, you can improve      access security and, at the same time, reduce end-user      friction. The important thing for your identity assurance      strategy is not only having systems that contain these types      of data, but also having real-time response capabilities in      your identity system.    <\/p>\n<p>      The message is simple and clear: Dont overlook data from the      broader IT ecosystem to help with ensuring secure, convenient      access to resources. You can learn more about how RSA SecurID Access is      enabling access to the modern enterprise in this on-demand webinar.    <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.csoonline.com\/article\/3212747\/identity-management\/authentication-and-it-ecosystem-leveraging-data-from-multiple-sources.html\" title=\"Authentication and IT Ecosystem: Leveraging Data from Multiple Sources - CSO Online\">Authentication and IT Ecosystem: Leveraging Data from Multiple Sources - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> sponsored Your immediate IT ecosystem is just one part of the broader IT ecosystem and therefore just one source of information that can be used to authenticate identities and grant access to systems. From your threat detection system to your organizations physical security systems, there are a variety of sources of data that can provide insights into identity assurance. When building out your identity assurance strategy, its worthwhile to look at the system management and security tools in the broader ecosystem and ask yourself: What information from these sources do I wish our identity system knew?  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/eco-system\/authentication-and-it-ecosystem-leveraging-data-from-multiple-sources-cso-online.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[33],"tags":[],"class_list":["post-231783","post","type-post","status-publish","format-standard","hentry","category-eco-system"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/231783"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=231783"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/231783\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=231783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=231783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=231783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}