UPDATED 08:30 EDT / JANUARY 12 2016

NEWS

Centrify tackles IT outsourcing security risks with new access controls

As the complexity of enterprise technology infrastructure continues to increase, so does the number of outsourced personnel CIOs are bringing aboard to support their operations. The trend is opening a new channel of attack for hackers that Centrify Inc. hopes to close with the latest iteration of its cloud-based login manager that was announced this morning. The service acts as a buffer between external workers and the sensitive systems they are tasked with maintaining.

An organization’s internal security staff can configure Centrify Privileged Identity Management to restrict what parts of its infrastructure are accessible by a contractor based on their role. That way, outsourced talent like, say, remote developers, may be limited to using only the servers set aside for the application project they were hired to complete. The service is able to similarly curb the scope of permitted activities on that hardware in a manner that reduces the potential for abuse without hindering worker productivity, according to the firm.

If a contractor has to perform some special action that necessities broader access than what the client organization’s default configurations allow, they can to ask for extra permissions through a purpose-built communications mechanism in Centrify’s online login portal. The security administrator on the receiving end may choose to refuse the request if they detect signs of malicious activity, or, in the event nothing is out of order, set time limits on the additional account privileges to ensure they are not used for anything other than the stated purpose.

The feature removes the need to grant advanced access permissions on a permanent basis to outsourced workers who only require they periodically, thereby drastically reducing the potential damage from an account breach. The new iteration of Centrify’s service enables organizations to further limit the amount of havoc hackers can wreck with a multifactor authentication mechanism capable of blocking malicious login attempts that employ stolen credentials. Rounding out the value proposition is reporting functionality that makes it easier for administrators to pick up on such incidents and report them to their superiors.

Image via Pixelcreatures

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.