Magazine Button
Centrify expert: There are no longer any security parameters

Centrify expert: There are no longer any security parameters

More News
Dr Kamel Heus says there are no any parameters when it comes to security

An expert from Centrify believes a change in security parameters has led to an avalanche of cyber breaches.

Dr. Kamel Heus, Security and Identity Specialist for Centrify, says despite the huge amount of money spent on security, breaches are possible due to changes in the way technology has developed.

“For years, we relied on a very well-defined network or a very a well-defined perimeter. We had our firewalls, we knew exactly where our data was, and we knew it was actually behind the perimeter,” said Heus.

“Nobody could get in except the people that we knew.”

However, this situation changed with the development of technology.

“Now the world is very different, we don’t have this perimeter anymore because the world is a very complex canvas of digital connections, be it inside the company or outside the enterprise,” said Heus.

“This perimeter now doesn’t exist at all. What we notice in Centrify is the new perimeter for security is the identity of people accessing resources.

“Why is that? Because in every connection or every access to a critical resource, there is one common denominator. It’s the identity of the person or the entity accessing this resource.

“We are pushing into completely rethinking the securities and to make security much more about the new perimeter which is called the Identity. This is exactly what we do.”

Heus explained the Centrify approach to security.

“We do secure identities. We secure any connection to critical resources or to maybe critical data for us to stop the breach,” he said.

“Our job is really to stop data breaches by securing all enterprise identities. It’s the way we need the ‘paradigm shift’ in the way we do security.”

Centrify offers Identity and Access Management and Privileged Identity Management to secure access across computer network and cloud computing environments.

Click below to share this article