Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Centrify Innovations Embrace Zero Trust Security

December 2017 by Marc Jacob

Centrify announced its Zero Trust approach to security. Zero Trust assumes that everything—users, endpoints, resources—is untrusted and must always be verified to decrease the chance of a major breach.

Customers are adapting to the reality that older, network centric approaches to security no longer apply and more application centric models, with access grounded in identity, are necessary for today’s hybrid enterprise. Google’s BeyondCorp implementation is an excellent example of this new approach. BeyondCorp is a Zero Trust security framework that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.

Zero Trust Security Model Product Enhancements

To further its move towards a Zero Trust security model, Centrify has joined the FIDO (Fast IDentity Online) Alliance and strengthening its integration with Yubico. Centrify Identity Services provides support for the FIDO Alliance’s Universal 2nd Factor (U2F) specification, an authentication standard designed to be open, secure, private and easy to use. Centrify already leverages Yubico’s YubiKeys for PIV Compliant and OATH-based authentication, and is further strengthening the partnership with this new support for FIDO U2F authentication. FIDO U2F certified authentication is recognized by the National Institute of Standards and Technology (NIST) as the highest Authenticator Assurance Level (AAL3) in the NIST Special Publication 800-63 Revision3.

As enterprises move towards modern ephemeral architectures, Centrify is extending the reach of Zero Trust by continuing to build on its support for container-based ephemeral architectures. Centrify Infrastructure Services is now the only privileged identity management vendor to offer host-based privilege controls for CoreOS Container Linux, the leading container operating system. Centrify Infrastructure Services provides conditional access and least privilege control to CoreOS deployments.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts