2018 was an alarming year signaling the need for data security after various data were exposed through cyber attacks. Billions of people data were breached in 2018, and surprisingly 765 million people were affected in April, May, and June alone.
Audit, compliance, and governance solutions are growing at a rapid pace as part of the Identity Access Management (IAM) market, which is anticipated to grow at a CAGR of over 17% by 2024, according to a report by Grandview Research.
The most recent survey conducted by the SANS Institute (News – Alert) starts off by summarizing stunning breaches associated with sensitive data exposure based on misconfigured Amazon Simple Storage Service (S3) instances including a Verizon (News – Alert) partner who leaked the personal information of more than 14 million Verizon customers, voter data associated with the Republican party revealing private data of nearly 200 million American voters, and the exposure of the L.A. Times’ website source code.
With the explosive growth of Internet of Things (IoT) devices and the related massive data produced at the edge of the network, the centralized cloud computing model is running up against limitations associated with bandwidth, computing resources, and the latency often associated when processing is done in the cloud instead of locally.
A report published by Cyber-Security Insiders revealed eye-opening responses from CSOs, CIOs and other executives in global enterprises. In summary, their research (commissioned by CA Technologies) uncovered these five facts:
Ransomware is a troubling trend in the world of enterprise security. When a computer in an enterprise is “infected” with ransomware, it automatically and persistently tries to jump other computers and propagate through the network.
Service providers have spent billions virtualizing network functions and moving applications to the cloud; this calls for new approaches to software-driven security solutions.
Public cloud, private cloud, hybrid cloud, multi cloud – all have advantages, but the management of so much diversity can be brutal. Unify the management across clouds and save time and money, while managing risk.
The modernization and virtualization of enterprise networks include upgrades to the way next-generation networks are secured and managed. This has everything to do with the convergence of networks, clouds, applications and services in the context of increasing transmission of data and the need to secure data at rest and data in motion, including in a world where data is shared between systems with the proliferation of APIs and exchanges.
A lot is being written about information security; opinions, suggestions, surveys, even conspiracy theories roam around, and news on a prominent organization’s data breach make headlines more often than ever, these days. It is not that people are just catching on to the significance of security and have recently become aware of the consequences.
More and more enterprises are turning to their trusted Communications Service Providers (CSPs) to manage more and more of their network and, increasingly, cloud-based services as part of digital transformation initiatives.
In a post by Gartner’s Jill Beadle, Privileged Access Management (PAM) was named the number one security project Chief Information Security Officers (CISOs) should invest in to reduce risk on a significant scale in large enterprises.
The Krontech team will be taking part in the IDC Security Roadshow, an annual event dedicated to today’s hottest subject: Information Security in the Era of Multi-Platforms (http://idcitsecurity.com/almaty/).
Modeled after the European Union’s General Data Protection Regulation (GDPR), which was brought into force at the beginning of May 2018, the California Consumer Privacy Act (CCPA) was signed into law in June of the same year and although the requirements do not go into effect until Jan 1, 2020, many are already deliberating if it will spread its roots to more states, provoking them to follow suit and enact privacy laws of their own.
Krontech (KRONT.IS), a leader in network Access Control Systems, announced today it has partnered with ITL Global Services (ITLGS), a leading provider of custom network solutions and critical business services, to support ITLGS’ customers with privileged access management through the adoption of Krontech’s Single Connect™ software.
“With great power comes great responsibility” are fictional character Ben Parker’s last words to his nephew, the soon to be famous Peter Parker, more widely known as your friendly neighborhood Spiderman. While we’re certain Uncle Ben’s character had little knowledge of today’s digital world, his words remain true for its technology enterprises. As they make our day-to-day life easier with their technology, our comfort and convenience come with a serious responsibility: the huge amount of personal data stored by the enterprises we interact with, unprotected and vulnerable to malicious acts.
A lot has been written about Privileged Access Management (PAM) and for good reason. The number of individuals required to run a modern network – or networks in the context of our multi-network, multi-cloud world – continues to grow.
The hot news lately has been about the compromise of networks by outside intruders. The facts show that internal breaches, whether intentional or accidental, done innocently or with malicious intent, comprise nearly half of all hacks. Here are a few statistics:
Today Krontech introduced our new theme and tagline: Protect What You Connect™. We have not taken the common path – we are disrupters and innovators, not because it is cool to be, but because we all share a common desire to protect what we connect.
It’s deja vu all over again! As the utility grid becomes even more connected, and converges with communications networks to support new applications, including Internet of Things capabilities, new threats and security risks are emerging. The evolution of applications to the cloud is only making the environment more challenging to understand and secure.
As more and more network functions are being virtualized, it only follows that the tasks associated those virtualized functions be automated. Privileged Task Automation (PTA), done properly, ensures that tasks which may previously been assigned privileged users (network operations teams, administrators, contractors, and vendors who need access to networks for maintenance and updates) are done with more accuracy and far less cost through scheduled software actions.