Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, is concerned that complying with the increasing amount of red tape required to retain personal information may hamper the ability of a business to protect that customer information successfully.
Already this year, Australian companies have seen the implementation of national Notifiable Data Breach legislation and the mandating of GDPR regulations for businesses with a presence in Europe. In addition, the Australian Prudential Regulation Authority (APRA) is currently developing a new proposed cybersecurity standard, CPS 234, planned to take force from July next year to further strengthen the Australian financial system. In April this year, the New Zealand Government announced plans to refresh its three-year-old Cyber Security Strategy.
Centrify Senior Director APAC Sales Niall King said regulatory protection of information privacy was completely commendable. “The challenge that faces companies is they have to defend against cyberattacks while also having to comply with multiple regulations from diverse jurisdictions,” he said.
“In an ideal world, these two activities would be aligned, but the reality is that while companies must jump through bureaucratic hoops to demonstrate their regulatory compliance, the bad guys don’t follow rules, so they keep on innovating to find new ways to get illicit access to private data.
“The bottom line is that if companies want to keep the crooks out and comply with government regulations, they need to rethink how they approach cybersecurity by putting identity protection at the centre of their defences.”
Mr King said that in many cases, hackers did not try to break in through corporate defences. “The fact is, they use the path of least resistance by deploying our own weak credentials against us,” he said.
“Reports show that 81 per cent of data breaches exploit weak, default or stolen passwords. That means four out of five breaches occur through a failure in identity protection.
“Centrify advocates a model of Zero Trust Security which assumes that every user - whether inside or outside the network - is a potential threat, so we verify every user, validate their devices, and limit their access and privilege to what is required to do their jobs. Centrify also uses machine learning to identify risky user behaviour and apply conditional access - without impacting user experience.
“This Zero Trust approach to security delivers the double benefit of closing off the most common access points for bad guys, thereby dramatically reducing the risk of illicit access to confidential information stored by a company.
“Securing identity while still making it easy for employees and partners to do their jobs is the key to delivering cybersecurity and regulatory compliance.”
For media assistance, call John Harris on +61 8 8431 4000 or email email@example.com.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilises machine learning to discover risky user behaviour and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognised solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5000 worldwide organisations, including more than half the Fortune 100 in the US, trust Centrify to proactively secure their businesses.
Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
- Centrify catches the leadership wave Centrify CEO Tom Kemp Centrify, the leader in securing enterprise identities against cyberthreats, overnight announced it has been named a Leader in the Forrester Research, Inc. J...
- Centrify delivers industry’s first unified identity solution for security and management of Mac users and their mobile devices in the workplace Centrify is Only Vendor to Provide Robust AD-based Authentication, Policy Management, Single Sign-On and User Self-Service for Connected and Disconnected Macs Centrify Corporation...
- Rémy Cointreau selects Centrify to simplify security Centrify Chief Product Officer Bill MannCentrify, the leader in securing enterprise identities against cyberthreats, has announced that Rémy Cointreau, one of the world...
- Hacked passwords cause 81% of data breaches Centrify Senior Director APAC Sales Niall King Centrify, the leader in securing hybrid enterprises through the power of identity services, has highlighted the fact that four out o...