sb-eu logo
Story image

Thales announces expanded access management capabilities

23 Sep 2019

New adaptive authentication, single sign-on and application visibility capabilities have been made available for Thales SafeNet Authentication Service customers with an automatic migration to SafeNet Trusted Access.

With the new access management capabilities of SafeNet Trusted Access, organisations have better control and visibility over their cloud estate with greater security, ease of use, and automated security capabilities to reduce the threats of identity-based attacks.

According to the 2019 Thales Access Management Index, the majority (97%) of IT leaders believe that cloud access management is necessary to continue their cloud adoption, and almost all (94%) have changed their security policies around access management due to a rise in security breaches in the last 12 months.

With adaptive authentication and flexible access management controls, CISOs and risk officers can secure all access points and gain ongoing insights into cloud and application access events.

This enables their organisations to ensure trusted access, safe adoption of initiatives like BYOD adoption, comply with regulations and expand their use of secure cloud services.

SafeNet Trusted Access is a cloud-based access management solution that combines the convenience of single sign-on with granular access security, allowing organisations to simplify and protect access to web and cloud-based applications.

Each time a user logs in to a cloud application, SafeNet Trusted Access validates the user’s identity, assesses which access policy should be applied, and then applies the appropriate level of authentication with Smart Single Sign-On.

With better control and visibility into their cloud ecosystem, SafeNet Trusted Access helps organisations prevent data breaches, migrate to the cloud securely and simplify regulatory compliance.

“Digital transformation is taking hold across organisations in every sector, but as more turn towards the cloud, it is important to remember that not all cloud-based applications will have the same access protocols needed to secure these environments,” says Thales access management solutions vice president Francois Lasnier.

“As such, we have enabled SafeNet Trusted Access customers with cloud-based authentication, to build and run their business activities in a multi-cloud world.”

SCOTT Sports IT infrastructure and security technical leader Coralie Fontaine says, “With its adaptive authentication and single sign-on capabilities, SafeNet Trusted Access enables us to provide access to our cloud and web apps, complete with integrated cloud single-sign-on and multi-factor authentication capabilities.

“This removes the need for any extra administration like re-deployment or re-enrolment, and enables the implementation of a secure, conditional access and step-up authentication with single integrated access management.”

Story image
Metallic adds data management and GDPR compliance
Now GDPR compliant, additions to the portfolio include eDiscovery features and support for Microsoft Hyper-V and Azure Blob and File storage.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Video: 10 Minute IT Jam – F-Secure talks APTs and the Lazarus Group
We spoke to F-Secure's director of detection and response, Matt Lawrence.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More