Security Market Segment LS
Monday, 04 December 2017 11:00

Warning: Old security models failing to cope with rise and frequency of data breaches

Warning: Old security models failing to cope with rise and frequency of data breaches Image courtesy of Stuart Miles at

Global security solutions and identity services vendor Centrify has warned that the increasing size and frequency of data breaches clearly demonstrates that old security models based on protecting network perimeters are failing both businesses and consumers.

Releasing its so-called Zero Trust approach to security, Centrify says this approach assumes that everything — users, endpoints, resources — is untrusted and always must be verified to decrease the chance of a major data breach.

Centrify accompanies its warning with a note that the problem with old security models is a “significant lesson” for Australia with its mandatory data breach notification law taking effect from February next year.

According to Centrify chief product officer Bill Mann, Zero Trust is the right approach to security today due to the porous network perimeter created by the rise of remote workers, BYOD devices and cloud resources.

“The modern hybrid enterprise must adopt a Zero Trust security model,” he said.

“Zero Trust is based on the motto of ‘never trust, always verify’, which assumes that internal networks can no longer be relied upon as a way of protecting enterprise resources and that users and devices within a network are no more trustworthy than users and devices outside of the network.

“Remote employees on BYOD devices accessing SaaS applications are as common today as someone sitting at their workstation inside the office. Centrify is committed to helping its customers embrace this reality by moving towards a Zero Trust security model where all access is authenticated, authorised and encrypted – with identity at the centre.”

According to Centrify, customers increasingly recognise that older, network-centric security approaches no longer apply, and today’s hybrid enterprise requires more application-centred models, with access grounded in identity.

Mann explains how Zero Trust delivers benefits including:

  •     Identity Assurance, which evaluates the security posture of a user based on location, device and behaviour to determine users are who they say they are;
  •     Trusted Endpoints, which only allow access to corporate resources from trusted endpoints, whether it’s a corporate owned, BYOD or public desktop, laptop or mobile device;
  •     Conditional Access, which grants just-in-time access to specific applications and infrastructure for a limited timeframe to users with a confirmed identity and who are using a trusted endpoint when logging in; and
  •     Least Privilege, where just enough privilege is granted, just in time to perform the needed operations and lateral movement is limited.

And Mann says major innovations amplify the need for Zero Trust networks, such as machine learning, move to ephemeral servers, adoption of microservices and security convergence, and claiming that to further Centrify’s move towards a Zero Trust security model, it has joined the FIDO (Fast IDentity Online) Alliance and strengthened its integration with Yubico.

“As co-creator of the FIDO U2F standard, Yubico believes that secure, easy-to-use and scalable authentication should be available to everyone,” said Jerrod Chong, vice-president of Product at Yubico.

“Centrify shares our mission to bring greater security and convenience to the enterprise. By adding FIDO U2F support, Centrify has the most complete set of YubiKey integrations available from a technology partner.”


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Peter Dinham

Peter Dinham is a co-founder of iTWire and a 35-year veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).



Recent Comments