Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
NewsWatchGuard
Home›News›Identity Management and Risk Authentication: Core Technologies to Achieve Zero-Trust Security

Identity Management and Risk Authentication: Core Technologies to Achieve Zero-Trust Security

By admin
09/02/2021
1191
0
Share:

In a dynamic world, where user mobility impacts security almost 100% of the time, multi-factor authentication (MFA) has become imperative and key to deploying a zero-trust network. Why?

• Users are connecting to company resources from different, unprotected networks
• Working hours have become more flexible, so they could be working from early hours to late evenings
• Devices could have been shared with other family members
• And this all means attackers will try to exploit this new world of possibilities

We can no longer rely on network perimeter-centric security structures. The increasing adoption of Cloud and remote access mean that businesses need to enable secure access to their users (employees, contractors, partners) regardless of the location, network or device.

MFA is not the only solution you need to adopt a zero-trust security structure, but identity and access management certainly are core technologies that your business needs to implement to get on the right path to embracing the “never trust, always verify” approach.

MFA and Risk Authentication Equal Optimized User Management

Risk-based authentication takes risk factors into account when performing an authentication decision. It goes beyond static authentication, allowing administrators to create rules that can modify the authentication behavior, sometimes making it easier if the risk is low; or asking for additional steps to ensure this is the right user, and blocking the access if the risk is too high, even if the user provided a correct one-time password (OTP).

Without risk policies in place, your company would need to enable the most secure authentication method at all times, for all users, potentially causing user friction for some segments. Risk authentication is a way to modernize your strategy by using the precise amount of security with customized risk protection that improves your ability to detect and respond to threats.

Four Reasons Your Business Should Enable Risk Authentication Policies

  1. Better at protecting resources
    Risk-based authentication allows you to rank the resources you want to protect based on level of risk and type of user who needs to access them. By creating custom rules specific to your company needs, you are advancing the way you enable MFA in your organization.
  2. A step towards zero-trust adoption
    One of the principles of the zero-trust approach is “Identifying Users and Devices.” The connection is obvious: MFA is the cornerstone for zero-trust implementation in that it provides the security structure for user and identity management and continuous authentication for any user to any resource.
  3. Advanced security for remote access
    Authentication policies can help optimize security especially for remote employees since they are accessing company data and networks from multiple locations. Also, remote work has increased the use of Cloud services and platform as a service, which are key scenarios where having risk policies enabled can ensure allowing access only to authorized users, as well as detecting any unauthorized attempts.
  4. Simplified user experience
    Risk-based authentication also improves user experience by removing extra authentication when enough security is verified. For example, if a user is accessing a resource from a known safe location, they won’t have to use MFA.

From any angle you look it up, multi-factor authentication is an essential solution to protect user identity, Cloud applications, networks, and company data. If you are focusing on enabling a more sophisticated security approach, then you are already thinking about what it takes to be zero-trust ready. If that’s the case, risk authentication is a must-have in your MFA framework.

Want to learn more about how businesses should assess risk? Check out the business risk assessment guide with tips to identify key risk policies that align with your company security needs.

Previous Article

New Firmware and Software Releases

Next Article

Eight WatchGuard Leaders Honored in the 2021 ...

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • SNWL Channelnomics Award
    News

    SonicWall’s Steve Pataky Nominated for Channelnomics Innovation Awards 2018, Security Channel Chief of the Year

    05/11/2018
    By admin
  • BarracudaNews

    Cloud Security Guardian wins Cloud Security Innovation of the Year in 2019 SDC Awards

    24/12/2019
    By admin
  • Barracuda NextGen Firewall for Azure Earns Top Honors from Redmond Channel Partner Editors
    News

    Barracuda NextGen Firewall for Azure Earns Top Honors from Redmond Channel Partner Editors

    08/05/2017
    By admin
  • SonicWall Logo
    News

    SonicWall – Connecting and Protecting the Remote Islands of Corporate IT – BYOD and Mobility

    18/08/2017
    By admin
  • BarracudaNews

    Barracuda research uncovers techniques cybercriminals are using to make business email compromise attacks more convincing

    21/11/2019
    By admin
  • SonicWall CRN ARC Report
    News

    SonicWall Email Security Wins Coveted 2018 CRN Annual Report Card (ARC) Award

    19/08/2018
    By admin

  • FortinetNews

    Fortinet Wins “Professional Certification Program of the Year” Award in 2019 CyberSecurity Breakthrough Awards Program

  • Alerts & BugsTrendMicro

    Trend Micro Worry-Free Business Security Services Systems Update

  • WatchGuard logo
    Alerts & BugsWatchGuard

    WatchGuard GAV Outage for 11.10.5 and earlier software versions

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home