Symantec two factor authentication8/28/2023 ![]() ![]() These same groups will likely be equally blindsided when new employees want to eschew passwords and use biometrics on their smartphone to log onto corporate applications. The IT and cybersecurity industries were caught off guard by the tidal wave of mobile device proliferation. RSA jumped on this trend with the introduction of its Via identity solutions while a Nok Nok Labs panel (hosted by yours truly) pointed toward a future of identity consumerization. Between the Apple iPhone and FIDO specification, biometrics and two-factor authentication are moving toward commodity status. Why the secondary role? Security veterans remain skeptical after an annual prediction, declaring it “the year of two-factor authentication and PKI.” Nevertheless, there is finally a reason to be optimistic. Two-factor authentication. If the RSA Conference was the Emmy Awards, multi-factor authentication would have been quietly nominated for a best supporting actor award.With all of the software-defined rhetoric, hardware remains important – the winning formula here is bridging the old physical network security with the new virtual security to deliver security efficacy and operational efficiency. In the meantime, Juniper flexed some hardware muscle by introducing a 2tbps version of its SRX firewall. Meanwhile, startups like Illumio and vArmour pitch a software-defined approach for the whole heterogeneous cloud computing enchilada while Tufin had a similar message around network security automation and orchestration. Cisco is trumpeting the marriage of ACI and network security while VMware NSX gains traction in the market with support from partners like Check Point and Palo Alto Networks. There is a lot of innovation in this area as well. Virtual workloads are moving across private and public clouds and this activity is antithetical to traditional network security controls. Data center security. The data center security buzz really concentrated on cloud/virtual data center security, and this makes sense.In my humble opinion, this is a prudent decision – especially as enterprise organizations increase their use of cloud computing, mobile devices, and IoT. Users are now telling me that they are postponing security technology purchases until they can collect, process, and analyze the right data in real-time in order to accelerate and improve their cybersecurity decisions. ![]() In some cases, it’s all of the above with tools from IBM, Intel Security, LogRhythm, Splunk, or Symantec. This includes endpoint profiling (ForeScout, Great Bay Software, Promisec, Tanium), endpoint forensics (Carbon Black, Guidance Software, RSA ECAT), and network forensics (Blue Coat/Solera, Click Security, FireEye, WildPackets). Visibility. As the old management adage goes, “you can’t manage what you can’t measure.” Cybersecurity professionals are taking this saying to heart with a focus on gaining better visibility of everything on the network at all times.Since I live in the cybersecurity space, there were few surprises, but there were a few major highlights to this year’s show: As expected, the 2015 RSA Conference was bigger than ever – more attendees, presentations, exhibitors, etc. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |