Menu
Don't overlook identity when it comes to security: CA Technologies

Don't overlook identity when it comes to security: CA Technologies

A new approach to security and identity management is needed in current environment

Comments

Cloud computing, social networking, big data analytics, and mobile devices may be impacting our daily lives in a big way. But their effect on the security space should not be understated, according to CA Technologies security product marketing senior director, Baber Amin.

Amin made the observation during the Gartner Security & Risk Management Summit in Sydney recently, where he spoke about how businesses can ensure that security supports and enhances, rather than limits, business growth.

“The business of IT is changing,” Amin said. “Tellingly, we have seen the blurring of professional and personal lives brought up by pervasive connectivity.”

Another key market shifts he highlighted was the externalisation of the business.

“Data and applications are now accessible anywhere and anytime,” he said. “This has empowered users with high expectations.”

Amin added that the network perimeter we are familiar with is “gone.” He sees identity as being the “new” network perimeter.

“Centralised identity servers can be used to control access to all enterprise applications, whether they are Software-as-a-Service based and/or on premise,” he said.

However, expanding identity silos are not without problems, he said.

“What we are now faced with is ‘shadow IT,’ and this in turn creates ‘shadow identity,’” he said.

The problem with shadow IT is that it creates a “big risk to enterprise information” and thus security functions need to evolve to meet this head-on, accoding to him. Amin's advice is for customers to reduce shadow IT before they seek a Cloud security broker or ponder whether a new security solution should be built or bought.


Follow Us

Join the newsletter!

Error: Please check your email address.
Show Comments