iTnews
Partner Content

Solving the post-COVID digital access control headache

By Staff Writer on Sep 15, 2021 9:50AM
Solving the post-COVID digital access control headache

Move past reliance on VPNs.

Many companies have put in place systems to allow their employees to work from home during the pandemic, and continue to work in a flexible capacity moving forward. But in many cases, they haven’t changed the way they secure their remote workers’ access, says Rana Gupta, Vice President, APAC, Authentication & Encryption for Thales’ Cloud Protection & Licencing (CPL) division.

We asked Gupta to explain how organisations can overcome digital access control challenges. Listen to his answers below in part two of our two-part Thales-sponsored podcast mini-series about zero trust security (listen to part one here).

Gupta says that a substantial portion of Australian organisations surveyed by Thales don't have any deployed access management solution.

Many companies are reliant on VPNs and perimeter-based security models, which Gupta argues do not scale well and don’t suit the distributed nature of work today.

The alternate approach, championed by Thales and others, is the zero trust approach, which is enabled by highly scalable digital identity and access management solutions, such as the Thales’ SafeNet Trusted Access platform.

In the podcast episode below, Gupta talks about the practical implications of this approach – such as the level of access control that companies should consider for people in different departments and roles.

“Each role has to have the access to enough information and part of the business application to be able to do her function, but she shall not have the access to all the information, not even within her own department,” he says.

“And then you also have the IT people who need to be provided access to these business applications and systems for the purpose of their ongoing maintenance, but they shouldn't have any access to any of the data at all. For example, someone from IT who was managing the payroll application –you wouldn’t want this person to get into or see all the data related to everyone's compensation.”

This could become complicated. Gupta espouses Thales’ platform approach as a way to avoid problems managing multiple point access control products.

He also encourages companies to consider the possibility that their access management needs may change over time. “So don't go with a feature by feature comparison,” he advises.

To find out more about modernising your organisation and strengthening your Identity and Access Management strategy, visit the Thales website. You can also check out Thales' latest Access Management Index report. 

 
Apple Podcasts Spotify Google Podcasts
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
access controliamidentity and access managementpartner contentsecuritythales

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Staff Writer
Sep 15 2021
9:50AM
0 Comments

Related Articles

  • Why your organisation's perimeter cybersecurity model is outdated
  • Atos rules out sale of cyber security arm to Thales
  • Thales considers move for Atos' cyber security arm
  • Your business must bring cybersecurity out of its "dark corner"
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

Digital Nation

CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.