Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access, Oh My!

April 3, 2017 |
Decorative image of computer promoting webinar: SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access

Increasing cyber threats from malicious insiders, over-privileged users, and compromised third-party users are problems that traditional, network-centric security solutions are ineffective against.

Yet the combination of IT diversification (enterprise resources, applications, databases and infrastructure spanning multiple platforms, tenancy and locations) and a lack of a defined network perimeter (work habits have changed as people work outside the perimeter, meaning a new model is needed).

Gartner and Forrester advocate that customers should investigate Software-Defined Perimeter (SDP) technology. Gartner specifically says:

Favor software-defined perimeters (SDP) and other isolation technologies capable of precise, context-based, application-level access only after successful authentication.

Software-Defined Perimeter Defined

The Software-Defined Perimeter is a security architecture developed by members of the Cloud Security Alliance, and is designed to provide on-demand, dynamically provisioned secure network segmentation for user access. A Software-Defined Perimeter solution ensures that all endpoints attempting to access a given infrastructure are authenticated and authorized prior to being able to access any resources on the network. All unauthorized network resources are made inaccessible. This not only applies the principle of least privilege to the network, it also reduces the attack surface area by hiding network resources from unauthorized or unauthenticated users. A Software-Defined Perimeter overcomes the constraints of traditional tools by effectively creating a dynamic, individualized perimeter for each user – a network segment of one.

SDP to Prevent Malicious Insiders, Over-Privileged Users, and Compromised Third-Party Access

To learn more about how a Software-Defined Perimeter protects against malicious insiders, over-privileged users and compromised third-party access, join the Cryptzone webinar and learn how to:

  • Implement the Software-Defined Perimeter zero-trust security model.
  • Render network assets invisible to non-authorized users.
  • Enforce the principle of “least privilege”.
  • Use fine-grained policies built on user-identity and user-context.

Register for the 2pm New York / 7pm London Session

Register for the 2pm London / 9am New York Session

Back to Blog Home

Paul Campaniello

Paul Campaniello is the Chief Marketing Officer for Cryptzone where he is responsible for worldwide marketing strategy, execution and sales support. Paul has over 25 years of experience with software startup companies.

He has held several senior marketing and sales positions including CMO/VP of Marketing at ScaleBase, Mendix, Lumigent, ComBrio and Savantis. Prior to Savantis, he was at Precise Software, where he helped build Precise from a startup to $100 million prior to going public and being acquired by VERITAS for $640 million.

Paul holds both a BS and an MBA from Bentley University.

Leave a Reply

Your email address will not be published. Required fields are marked *