IT Brief Australia logo
Technology news for Australia's largest enterprises
Story image

The post-pandemic workforce requires secure IAM capabilities

By Contributor
Thu 26 May 2022

Article by HID Global director of product marketing Matthew Lewis.

The business landscape continues to evolve rapidly, and with that, the risks of those businesses are changing. Whether it be zero-day threats evading traditional defences, the impact of digitalisation on productivity and skills, or the growth of remote work, it is clear that a holistic approach is required for securing identities to access critical assets, facilities, and infrastructure.

The COVID-19 pandemic caused an upheaval in the way we work and interact within the workspace and beyond. A recent study by Frost & Sullivan details that organisations will not revert to pre-pandemic operating models. Remote and hybrid work seems destined to stay for the long term.

This being the case, organisations and service providers will need to put controls and protections in place to ensure assets are secured, regardless of an employee's location.

A key driver of these changes is the cloud, with businesses increasingly recognising its role in any technology architecture. However, as more organisations move towards the cloud, the organisation's risk posture evolves.

Many companies have experienced a dramatic shift from the global pandemic in how they conduct business, which industry experts consider a mass acceleration of change. Plans for technology rollouts that were made to occur over a 3-to-5-year timeframe have been deployed almost overnight.  

Changes in the work environment expanded the network perimeter significantly – or rendered it inert in some areas. The old network perimeter was built around on-site users, endpoints, servers, and software. In comparison, the new perimeter encompasses remote offices and employees, new cloud-based enterprise apps, and a growing array of devices underpinned by hybrid cloud architecture.

Further, the extended workforce, including partners, vendors, contractors, and others that aren't directly employed by an organisation, can exacerbate these challenges.  

So how do organisations move to the cloud while maintaining a secure foundation along the journey? If a security chain is only as strong as the weakest link, the question really is, are you willing to look for and remediate the weakest link? Otherwise, you must be prepared to take the risk of having the weakest link exposed.

Often that weakest link is related to identity, which is the predominant attack vector of choice for bad actors. Users with excessive privileges and dormant accounts are ripe targets to perpetrate an offensive action against an organisation.

IAM is a key element of a zero trust strategy designed to help address the constantly changing nature of attacks. The basis of zero trust is to never trust, always verify. This framework requires all users to be authenticated, authorised and validated before being granted access to networks and applications, sometimes with additional corroboration needed as conditions change.

The biggest challenge with zero trust is putting it into practice. That is, identifying the ways of implementing the relevant zero trust technologies to implement a continuous regime for monitoring systems, policies, and responses to always verify identities and secure access.

As organisations look toward zero trust, they will need to identify the workflows, business processes, and how users initiate and interact with those flows. From there, it is necessary to identify risks and map proper controls to help secure the organisation.  

As such, it is vital to consider users' experiences in mind throughout the planning and implementation process. Friction between an employee and a company's vital systems can lead to compromised security – whether from carelessness, frustration or malicious behaviour. 

Lastly, it is imperative to have a functional and intuitive audit and reporting capabilities to ensure the organisation doesn't amass "security debt"- the painful legacy of obsolete and partially integrated systems - and simplify compliance reporting when needed.

Zero trust priorities vary by industry, so it's important to explore what certain implementation sequences or tools mean for a company's risk profile. For example, implementing identity-centric and least-privileged access control may have the greatest benefit over micro-segmenting networks or enforcing zero trust network access across managed and non-managed devices. 

Given the complexity of managing identities in globally distributed companies, it's not surprising that zero trust is a somewhat elusive goal.

Laying out an incremental, phased roadmap that considers the risks posed to your organisation is a great step. Also, partnering with vendors that can help in that journey, be it bridging current technology into the future or addressing multiple needs at once, can dramatically simplify your journey. 

This planning and design process is crucial. Gartner predicts that 30 per cent of large organisations will have publicly shared environmental, social and governance (ESG) goals focused on cybersecurity by 2026, up from less than 2 per cent in 2021.

The final goal is better security, but companies everywhere are looking to drive better business outcomes. Identity and access management planning and governance is a step along that path.

Related stories
Top stories
Story image
Microsoft
Elders signs five-year agreement with Microsoft to boost innovation
Australian agribusiness Elders has signed a five-year agreement with Microsoft that looks to transform its customer experience, efficiency and sustainability outcomes.
Story image
Ransomware
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Apple
Your tools, your choice: why allow employees to choose their own devices?
Jamf Australia says giving your team the freedom to work with their digital device of choice could help to attract and retain top talent in a tight labour market.
Story image
AGVs
Bridgestone Australia uses Dematic's AGVs to optimise warehouse operations
Bridgestone Australia has deployed Dematic's Automated Guided Vehicle solution across its new Melbourne warehouse in Truganina.
Story image
Collaboration
Enterprise service management: the importance of a one-stop shop
In an online world, employees and end-users want one place to go for all their questions and requests. Intranet technology and self-service portals are useful tools that help serve this purpose.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Story image
Management
MYOB snaps up Sydney-based management software specialists
MYOB has announced the acquisition of Sydney-based business management software and support specialists, GT Business Solutions.
Story image
Cybersecurity
Palo Alto Networks' cloud security platform receives IRAP assessment
"We provide help protect all forms of compute, cloud native services and access to data within public and private sectors."
Story image
Airwallex
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Cloud
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Supply chain
Supply chains continue to be disrupted, enterprises embrace circular economy
“Businesses urgently need to find a solution that can help them to manage this disruption, and transition to a circular economy."
Story image
Artificial Intelligence
Decision Inc. partners with provenio.ai to expand offering
Decision Inc. Australia has partnered with provenio.ai to expand its offering to clients in the retail, FMCG, manufacturing, supply chain and logistics sectors.
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Apple
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Infrastructure
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
Multi Cloud
Cloud is a tool, not a destination
For many years, “cloud” has been thought of as a destination which has led to a misguided strategy that sees an enterprise trying to shift all its applications to a single cloud provider – regardless of the specific needs and nuances of each individual workload.
PwC
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image
Story image
ASI Solutions
Western Australia CUA panel picks ASI as preferred supplier
Western Australia's Common User Arrangement (CUA) panel has chosen ASI Solutions as a preferred supplier for device hardware.
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Wiise
Four things wholesale distributors need to consider for FY2023
In a post-pandemic world, there are many things for a distribution business to juggle. ERP solutions company Wiise narrows down what companies should focus on.
Digital Transformation
Discover the 5 signs your business is ready for a cloud-based ERP. Is your business being left behind as more of your competitors switch to the cloud?
Link image
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Payroll
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
Accounting
Four factors to consider when choosing the right job accounting solution
Progressive job-based businesses can achieve success by strengthening their ability to quantify every cost attributable to the delivery of an outcome for a customer.
Story image
Metaverse
How the metaverse will change the future of the supply chain
The metaverse is set to significantly change the way we live and work, so what problems can it solve in supply chain management?
Supply chain
Discover the 4 critical priorities for wholesale distribution businesses in FY23. Are you worried about how supply chain issues may affect your business in 2023?
Link image
Story image
API
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why it's time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
Training
Barracuda customises training to fit ACSC Essential Eight
Barracuda has announced that its Security Awareness Training now provides a customised training curriculum in line with the Australian Cyber Security Centre’s (ACSC) Essential Eight.
Story image
Data Protection
Five signs your business is ready to move to the cloud
Many organisations are thinking about moving to the cloud. But what are the signs you are ready, and what are the reasons to move?
Productivity
Discover the 5 ways your ERP may be letting you down. Is your current system outdated, difficult to manage, and costing you a fortune?
Link image
Story image
CSG
To win at 5G, telcos must tame their quoting chaos
The catalogs of CSP (communication service providers) market offerings are set to explode as new digital services emerge, powered by B2B2X business models.
Story image
Media
Registrations for the W.Media Sydney Cloud and Datacenter Convention 2022 now open
Are you a C-Level executive looking to enhance your knowledge in the cloud and data center space in order to get the best results for your company?
Story image
Adobe
Marketplacer and Adobe accelerate partnership for enhanced commerce solutions
Marketplacer has accelerated its partnership with Adobe in order to further enhance the global commerce marketplace.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Document Management
NZ's FileInvite raises $10M in latest investment round
FileInvite has raised $10 million in Series A investment to fast-forward the extinction of email for requesting and collecting documents online.
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Malware
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
PwC
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Project management
Discover the 4 crucial factors for choosing the right job-costing solution. Is your team struggling to cost jobs and keep projects running on budget?
Link image