View
1.025
Download
0
Category
Preview:
Citation preview
MFA FOR ALL
INTRODUCTIONJ ust as no company—large or small—is safe
from the risk of a cyber attack, Multi-factor Authentication (MFA) is not just intended for only specific departments within your company.
Your company is only as strong as its weakest department. While finance and human resources may be the obvious departments to protect against compromised credentials, every employee who works for your organization, has the ability to protect it.
A security best practice is to regularly review each department to discover where issues might arise, identify areas of need, and provide unique solutions.
12016 Verizon Data Breach Investigations Report (DBIR) 01
63% of data breaches were caused by weak, default, or
stolen passwords 1
63%
01
INFORMATIONTECHNOLOGY
02
SECURITY REVIEW
SECURITY REVIEW: INFORMATION TECHNOLOGY
IT administrators who access critical resources are a common attack point to reach corporate “keys to the kingdom.”
Additional security measures to prevent an attacker from misusing stolen credentials to gain privileged access to valuable data.
ISSUE:
NEED:
Centrify’s MFA for Servers solution helps IT departments protect critical resources from attack by adding a policy-based second authentication factor requirement for users logging into Windows, Linux and UNIX servers or who require privilege elevation.
SOLUTION:
A large telecommunications company was the victim of a cyber attack in March 2016 when hackers stole information of 1.5 million customers.
Source: Identity Force
01
03
02
04
SECURITY REVIEW
FINANCE
Finance has access to some of the most sensitive and critical information in any enterprise. A single stolen finance password can spell complete disaster.
A simple solution that protects financial apps against password-based attacks, without compromising productivity.
ISSUE:
NEED:
Centrify helps mitigate password risk with adaptive Multi-factor Authentication integrated with single sign-on (SSO).
SOLUTION:
Nearly half of IT leaders in a recent global study believe finance departments pose the most significant security threat to their organizations.2
A recent data breach of a home improvement superstore chain resulted in 56 million payments cards and 53 million e-mail addresses stolen.Source: Bloomberg
2https://www.tripwire.com/state-of-security/latest-security-news/study-finds-finance-hr-staff-pose-biggest-security-risks-to-the-enterprise/#
02
05
SECURITY REVIEW: FINANCE
03
06
HUMANRESOURCESSECURITY REVIEW
HR departments are in charge of storing and managing highly sensitive employee information. These users have access to valuable information and assets, leaving them highly vulnerable to modern cyberthreats.
A solution that allows an organization to enforce access and authentication policies for HR employees.
ISSUE:
NEED:
With adaptive, strong authentication for every user, Centrify’s MFA solution bolsters secure access across all critical apps and infrastructure.
SOLUTION:
50%
45%
44%
39%
38%
According to organizations surveyed by PricewaterhouseCoopers, the leading impacts of advanced authentication technology are:3
Improved customer/business partner confidence
Enhanced fraud protection
More secure online transactions
Improved customer experience
Improved regulatory compliance
3 https://www.statista.com/statistics/588384/worldwide-information-security-survey-advanced-authentication/
03
07
SECURITY REVIEW: HUMAN RESOURCES
04
08
SECURITY REVIEW
SALES
04
This mobile and remote workforce needs anytime access to some on-premises apps, but traditional access methods and VPNs provide a prime target for attackers.
A way to seamlessly provision and manage user access, across applications and corporate resources, to keep salespeople productive and assets secure. Organizations also need an easy way to revoke or change access privileges as roles change and salespeople leave.
ISSUE:
NEED:
Of the many respondents to Cloud Security Alliance’s Identity
Security Survey Report, one in five said their organization experienced a data breach, and identified compromised
credentials as the cause.
Centrify provides simple MFA for VPN, without the need for dedicated tokens or complex infrastructure.
SOLUTION:
09
SECURITY REVIEW: SALES
1 in 5
SECURITY REVIEW
MARKETING
05
10
This team uses apps to research, write content and, collaborate on creative assignments. Often, freelancers log in to company servers to access files.
MFA to protect all users in the department so that company intelligence is protected.
ISSUE:
NEED:
of recent high-profile data breaches were due to
compromised credentials.
100%
Source: Mandiant
Centrify offers secure app & VPN access.
SOLUTION:
05
11
SECURITY REVIEW: MARKETING
06
12
CUSTOMERSERVICESECURITY REVIEW
Constant, repetitive security tends to get in this department’s way. Being constantly prompted for an additional factor is time-consuming and frustrating for customer service reps.
A smarter solution that recognizes security needs based on context.
ISSUE:
NEED:
Centrify’s adaptive authentication offers convenient, hassle-free security based on pre-defined policy rules.
SOLUTION:
A cybercrime group compromised a support portal for companies, using a particular computer technology corporation’s POS credit card payment system.
68% of people want their companies to provide extra layers of security.
Source: Krebs on Security
Source: Entrepreneur
06
13
SECURITY REVIEW: CUSTOMER SERVICE
CONCLUSIONMFA doesn’t have to be complex, and it
doesn’t have to slow users down. Today’s MFA only kicks in when needed, and can use mobile devices for a balance of speed, ease, and strong security. When implemented across your business, the right solution will keep your organization better protected against the very real possibility of compromised credentials. If you haven’t considered rolling out MFA to your entire organization, now is the time.
14
Check out LEVEL UP YOUR SECURITY: Leveraging Multi-factor Authentication to Power Protection to learn more.
Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT
environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading
point of attack used in data breaches―compromised credentials—by securing an enterprise’s internal and
external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance
and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac
management, privileged access security and session monitoring. Centrify is trusted by over 5000
customers, including more than half of the Fortune 500.
Visit us at Centrify.com.
Recommended