• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Next-Gen Access

Predicting The Future Of Next-Gen Access And Zero Trust Security In 2019

Predicting The Future Of Next-Gen Access And Zero Trust Security In 2019

By Louis Columbus on January 21, 2019

Bottom Line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognizing that identities are the new security perimeter. The faster any digital business is growing, the more identities, […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Behavior-based scoring algorithms, cybersecurity, enterprise IT security, Idaptive, Louis Columbus' blog, Multi-Factor Authentication (MFA), Next-Gen Access, NGA, Single Sign-On (SSO), Zero Trust Security, ZTS

Radio waves spreading out from a mobile phone in a shopping mall with matrix style data layered on top.

6 Best Practices For Increasing Security In AWS In A Zero Trust World

By Louis Columbus on January 13, 2019

Amazon Web Services (AWS) reported $6.6B in revenue for Q3, 2018 and $18.2B for the first three fiscal quarters of 2018. AWS revenue achieved an impressive 46% year-over-year net sales growth between Q3, 2017 and Q3, 2018 and 49% year-over-year growth for the first three quarters of the year. AWS’ 34% market share is more significant […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, AWQS EC2, AWS CloudTrail, AWS CloudWatch, AWS Console, Centrify, iaas, Infrastructure as a service, Louis Columbus' blog, MFA, Multi-Factor Authentication, Next-Gen Access, Zero Trust Privilege, Zero Trust Security, ZTS

People waiting in a crowd and using their phones.

Identities Are The New Security Perimeter

By Louis Columbus on August 29, 2018

18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey. Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Louis Columbus' blog, Next-Gen Access, Zero Trust Security

IBM's 2018 Data Breach Study Shows Why We're In A Zero Trust World Now

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

By Louis Columbus on August 6, 2018

Digital businesses that lost less than 1% of their customers due to a data breach incurred a cost of $2.8M, and if 4% or more were lost the cost soared to $6M. U.S. based breaches are the most expensive globally, costing on average $7.91M with the highest global notification cost as well, $740,000. A typical […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise security, IBM 2018 Cost of a Data Breach Study, Louis Columbus, Next-Gen Access, security, Zero Trust Security

Industry4.0 and IoT(Internet of Things). Factory automation system. AI(Artificial Intelligence).

Zero Trust Security Is The Growth Catalyst IoT Needs

By Louis Columbus on July 30, 2018

McKinsey predicts the Internet of Things (IoT) market will be worth $581B for ICT-based spend alone, growing at a Compound Annual Growth Rate (CAGR) between 7 and 15% according to their study Internet of Things The IoT opportunity – Are you ready to capture a once-in-a-lifetime value pool? By 2020, Discrete Manufacturing, Transportation & Logistics […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Accenture, byline=Louis Columbus, Centrify, Dragos Industrial Control Vulnerabilities 2017 in Review, Next-Gen Access, Zero Trust Security

Zero Trust Security Update From The SecurIT Zero Trust Summit

Zero Trust Security Update From The SecurIT Zero Trust Summit

By Louis Columbus on July 12, 2018

Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. 53% of enterprises feel they are more susceptible to threats since 2015. 51% of enterprises suffered at least one breach in the past 12 months and malicious insider incidents increased 11% year-over-year. These […]

Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, CIO, CSO, cybersecurity, machine-learning based security, Next-Gen Access, NGA, Zero Trust Security, ZTS

Analytics Are Empowering Next-Gen Access And Zero Trust Security

Analytics Are Empowering Next-Gen Access And Zero Trust Security

By Louis Columbus on July 1, 2018

Employee identities are the new security perimeter of any business. 

80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe.

Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, Centrify Analytics Service, Next-Gen Access, NGA, Verizon Mobile Security Index 2018 Report, Zero Trust Security

Three Ways Machine Learning Is Revolutionizing Zero Trust Security

Three Ways Machine Learning Is Revolutionizing Zero Trust Security

By Louis Columbus on May 27, 2018

Bottom Line: Zero Trust Security (ZTS) starts with Next-Gen Access (NGA). Capitalizing on machine learning technology to enable NGA is essential in achieving user adoption, scalability, and agility in securing applications, devices, endpoints, and infrastructure. How Next-Gen Access and Machine Learning Enable Zero Trust Security Zero Trust Security provides digital businesses with the security strategy they […]

Posted in Business, Featured Posts, Technology / Software | Tagged Centrify, enterprise security, Louis Columbus, machine learning, Next-Gen Access, Zero Trust Security, ZTS

abstract world network business connection blue background

How Zero Trust Security Fuels New Business Growth

By Louis Columbus on May 14, 2018

Bottom Line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses. The era of Zero Trust Security is here, accelerated by […]

Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, enteprise software security, GDPR, Next-Gen Access, Zero Trust Security

Man fingers setting trust button on highest position. Concept image for illustration of high confidence level.

How Machine Learning Quantifies Trust & Improves Employee Experiences

By Louis Columbus on April 11, 2018

Bottom Line: By enabling enterprises to scale security with user behavior-based, contextual intelligence, Next-Gen Access strategies are delivering Zero Trust Security (ZTS) enterprise-wide, enabling the fastest companies to keep growing strong.   Every digital business is facing a security paradox today created by their proliferating amount of applications, endpoints and infrastructure on the one hand […]

Posted in Business, Featured Posts, Technology / Software | Tagged AI, Centrify, cybersecurity, machine learning, Multi-Factor Authentication (MFA), Next-Gen Access, Palo Alto Networks, Verizon Mobile Security Index 2018 Report, Zero Trust Security

feed mail facebook twitter linkedin

EI Tweets

My Tweets

Popular Posts

  • Thursday’s Tech Showcase: SnapLogic Tackles Cloud/SaaS Integration Challenges
  • Salesforce Sees Surge In $1M+ Deals Powering Record Q1, FY22 Results
  • Cybersecurity CEOs Share How Businesses Can Protect Themselves In 2022
  • Is Social Business Dead?
  • Silicon Valley’s Defining Characteristics
  • Beyond The Three V’s of Big Data – Viscosity and Virality
  • The Architecture of a Social Business
  • Microsoft: A new era of vertical integration?

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos