Friends Don't Let Friends Run Exchange Servers
Orchestrating a Hybrid Cloud: Using SaaS Solutions with On Premise...
Focus of Application Management Solution towards Greenfield Ecosystems
"MacGyver-ising" Application Management
Hybrid IT Strategy: Simplifying Application Portability and Management
Dave Cope, Senior Director, Market Development, Cisco CloudCenter
Are You Analyzing the Right Data?
Stephen Baker, CEO, Attivio
Technology and Effective Communication Power Strategic Development
David Cagigal, CIO, Wisconsin Department of Administration
Control Application Downtime with Application Dependency Maps
Sridhar Iyengar, Vice President, Product Management, ManageEngine
Thank you for Subscribing to CIO Applications Weekly Brief
In Pursuit of Data Security
Microsoft Office 365, Salesforce and Workday are amongst the most used cloud applications across organizations today. The probability of the cloud applications you count on; being primarily password-protected and also having different access policies and password requirements are quite high. That is a significant cause for concern at a time when 81 percent of hacking-related data breaches are password-related.
A Multi-Factor Authentication Reduces Risks
The addition of multi-factor authentication is an important step you can take to reduce the risk of access associated with password-protected cloud apps. There are two fundamental ways that a multi-factor authentication solution integrated with your organization’s cloud applications makes data access more secure. First, it adds another layer of authentication to filter out unauthorized, unsecured and malicious access. Second, it provides IT security teams with broad visibility into access across multiple applications.
Suggested Read: Navigating the Ecosystem of Application Performance Monitoring
By Ulrica de Fort-Menares, VP of Product Strategy, LiveAction
In addition to boosting security across multiple apps, both on-premises and in the cloud, multi-factor authentication makes it more expedient for users accessing applications, and for the admins managing them. The risk-based approach to multi-factor authentication relies on data analytics, based on business context, user location, device and IP address, whether to challenge a user for further authentication of identity. If the analytics suggest a high-risk access attempt, the system can request additional authentication.
Utilizing a Risk-Based Approach Balances Security and Convenience
Instances of logging in on an unrecognized device or from an unlikely location or for the first time attempting to access a highly-sensitive resource are classified as high-risk access attempts. All multi-factor authentication solutions cannot offer a risk-based approach. Such approaches need an amalgamation of a multi-factor authentication solution that successfully combines sophisticated data analytics, the ability to recognize context, and machine learning is well worth seeking out. This is possible if you want secure access that offers robust protection for IT and convenient access for users.
You may like: Are You Analyzing the Right Data?
By Stephen Baker, CEO, Attivio