Cybersecurity

Multi-factor Authentication

Multi-factor authentication is an electronic authentication method.

Multi-factor authentication (MFA) is an electronic authentication method in which a computer user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession and inherence.

Something you know: Certain knowledge only known to the user, such as a password, PIN, etc.
Something you have: A physical object in the possession of the user, such as a security token, a smart card, a smartphone, etc.
Something you are: A physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern in key press intervals, etc.

Network Access Control

Network access must be controlled.

Network access control (NAC) is a solution that allows organisations to define policies that secure access to the network. The technology allows you to capture the status of the device. Only authorised devices that meet the defined conditions have access to the corporate network. Depending on the rules and the level of risk, it can allow devices to access the update network or the guest network.

Key benefits:

Authorization, authentication and accounting of wired and wireless connections,
providing visibility of each device trying to access the network,
security profiling,
compliance enforcement and
response and remediation methods.

Priviliged Access Management

Privileged access management (PAM) is used to protect against the threats posed by credential theft and privilege misuse.

Privileged access is a term used to designate special access or abilities above of a standard user. Organisations are facing challenges in protecting, controlling and monitoring privileged access. Priviliged Access Management (PAM) can discover, control, monitor, secure and audit all human and non-human privileged identities and activities across an enterprise IT environment. This allows organisations to run business efficiently and maintain the confidentiality of sensitive data and critical infrastructure.

Key benefits:

Secure Vault – Storing privileged credentials in an encrypted and centralised vault.
Discovering Privileges – Identify all services, application, administrator and root accounts to curb sprawl and gain full view of your privileged access.
Managing Secrets – Provisioning and deprovisioning, ensuring password complexity and rotating credentials.
Delegating Access – Set up RBAC workflow for access requests and approvals for third parties.
Controling Sessions – Implementing session launching, proxies, monitoring and recording.
X