Pavie ... adoption of cloud apps is fast becoming
mainstream
Gemalto launches SafeNet Trusted Access
AMSTERDAM, June 18, 2017
Netherlands-based Gemalto, a leading digital security company, has launched the SafeNet Trusted Access, an access management and identity protection service, to secure cloud and on premise applications.
Powered by a robust risk-based analytics engine, Gemalto’s solution delivers integrated cloud single-sign-on (SSO) and multi-factor authentication (MFA) capabilities so companies can easily implement secure, conditional access and additional authentication levels when outlined in the policy engine, said a statement from the company.
According to recent research, enterprises in 2017 are expected to utilise an average of 17 cloud applications to support their IT, operations and business strategies, it said.
With SafeNet Trusted Access a user can log on once to access all approved applications, as defined by the policy for that application, it added.
Sebastien Pavie, identity and data protection director for Middle East and Africa (MEA) at Gemalto, said: “The adoption of cloud apps is fast becoming mainstream. Yet IT teams lag in their ability to effectively manage and restrict access to these apps and offer their employees the convenience they expect.”
“With SafeNet Trusted Access, IT managers can set scenario-based policies linked to associated risk factors and implement step up authentication for a particular application or group of users, depending on the level of sensitivity and role,” he said.
“We built this newest addition on the expertise and success of the award winning SafeNet Authentication Service to support our customers as they migrate their enterprise workflows into the cloud. We designed this next-generation MFA and cloud SSO platform with the goal of making it easier for IT to align security with business processes,” he added.
Garrett Bekker, principal analyst at 451 Research, said: “Historically, controlling access to resources has been ‘red-light/green-light’ or binary – you’re either allowed in or you’re not, and once they are in, most SSO offerings are blind to anything a user does once they are granted.”
“By combining analytics with IAM, the service provides companies with the ability to identify anomalies in access patterns that could indicate risk and help prevent data breaches,” he added. – TradeArabia News Service