Category: Uncategorized

New partnership with Okta

Today we proudly present our new partnership with Okta. We think Okta is a great addition to our current solution providers, being one of the biggest IAM cloud solution providers. Okta has a high rating in Gartners Magic Quadrant for Access Management.

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 4,000 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.

Thousands of customers and millions of people use Okta every day. Okta is the foundation for secure connections between people and technology. It’s a service that gives employees, customers, and partners secure access to the tools they need to do their most important work.

Want to hear more about the IAM solutions Okta has to offer? Give us a call.

https://www.okta.com/


We look back at a successful Round Table on IAM by SecurIT and IBM

Yesterday on May 3rd we invited some IAM professionals to discuss different IAM issue’s and current trends in the Identity & Access Management landscape. This gave us the opportunity to learn from each other and share some customer stories as knowledge partner at the table. For this round table we selected Kasteel Woerden as location. We look back at a successful day where everyone received plenty food for thought. A short summary below on some of the topics that we discussed.

The first topic we discussed was how we currently deal with the automated life cycle management. This means the whole onboarding/off-boarding process and giving people the right access from begin to end. It became clear that for most it’s currently only partly automated and a lot is still done by hand. Which means there is a lot of time to win and this gets more important everyday with the lack of good security resources.

Another topic was scalability of the IAM services within an organization and how people thought about moving from on premise solutions to the cloud. Many pro’s and con’s regarding the cloud came by. The most important concern was trust. How can you be sure the cloud supplier has the same high security requirements as you do, or where is the data stored? One of the ways you can check this is by looking at their certification. Not just everyone can walk into their datacenters. Most agreed that for the time being there will be many hybrid solutions, with part cloud and part on premise.

We also talked about Identity Management and how you can use context to gain trust and when to force a second authentication, when trust us low. For example, if the same person logs on from a new location a 2-factor-authentication might be required. But it goes even further than that, for example how quickly you type in your password. These can all be triggers to ask for the extra verification.

Resources, specially how to use them productively, was touched during many topics, but very specific during the cloud discussion. If you move your IAM functions to the cloud, would you still need all these security resources on-premise? How much of the responsibility are you willing to give away? It became clear that you will always need your security resources on-premise to manage these new cloud solutions. Knowledge is power and it can be too risky to depend only on third parties for this.

The last topic we discussed was how to handle privileged accounts and how to make sure they are secured. Many different solutions can help with this, but it became clear most of the professionals prefer to store the credentials in a vault. From there you can secure the way the organization works with the most sensible credentials. If a change has to be made this can be requested by sending a change request. This way you will always know who and why is inside your system. You can even shield some of the privileged functions and only give access to the ones that are required and for a limited period.

We are looking forward to the next one. Didn’t get invited or where you unable to attend this one? Let us know and we will keep you updated on when the next one takes place. Got urgent questions? Give us a call.


Less than 30% can prevent ransomware attacks

Less than 30 percent of IT security executives who responded to a recent survey reported that they would be able to prevent large-scale ransomware attacks.

Despite this, SolarWinds MSP’s new report, “The 2017 Cyberattack Storm Aftermath,” found that IT security executives have a high level of knowledge of crypto-malware. More than two-thirds (69 percent) of respondents said they were deeply familiar with ransomware attacks such as WannaCry, which infected hundreds of thousands of endpoints within 48 hours earlier in May 2017, and Petya, which affected systems in dozens of countries in June 2017.

This familiarity led approximately three-quarters of survey participants to rate the risk of both WannaCry and Petya as very high, but it didn’t translate to better protection against this type of incident. While most respondents indicated that they would be able to detect WannaCry (72 percent) and Petya (67 percent), only 28 percent and 29 percent, respectively, said they would be able to prevent these attacks.

For the full article please visit the following link.

Source: Less Than 30 Percent of IT Security Executives Can Prevent Ransomware Attacks, Survey Reveals


CyberArk acquires Vaultive

CyberArk (NASDAQ: CYBR), the global leader in privileged account security, today announced the acquisition of certain assets of privately-held Vaultive, Inc., a cloud security provider. The deal closed today.

The CyberArk Privileged Account Security Solution is the industry’s most comprehensive solution for protecting against privileged account exploitation anywhere – on-premises, in hybrid cloud environments and across DevOps workflows. Building upon the Vaultive technology, CyberArk will deliver greater visibility and control over privileged business users, and Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) administrators. By delivering a cloud-native and mobile experience, Vaultive will extend the CyberArk solution to these highly privileged users, which are frequent targets for cyber attacks.

“The Vaultive team brings innovative technology and advanced cloud industry experience to CyberArk. We look forward to incorporating the technology to add additional depth and proactive protection for enterprises facing an expanding attack surface in the cloud,” said Udi Mokady, chairman and CEO, CyberArk. “Vaultive provides a strong building block to accelerate CyberArk’s cloud security strategy, making CyberArk the only vendor able to extend privileged account security to administrators and privileged business users in cloud environments with this level of granularity and control.”

For the full article please visit the following link.

Source: CyberArk Press release


CyberArk DNA™

CyberArk Discovery & Audit (DNA) is a powerful tool (available at no charge) that scans systems on your network to uncover accounts, credentials and misconfigurations that can create risk. Following a scan, CyberArk DNA generates a detailed report that IT auditors and decision makers can use to evaluate the status of privileged accounts in the organization and identify areas of risk. The tool is an agentless, lightweight executable designed to expose the magnitude of the privileged account security challenge in on-premises and cloud-based environments. CyberArk DNA helps organizations uncover: ƒ

  • Windows accounts and account statuses. Identify privileged and non- privileged Windows accounts, including local administrator, domain administrator, standard user and service accounts. View the password strength, password age and last login date. ƒ
  • Unix accounts, credentials and permissions. Centrally view the status of root and individual user accounts on Unix systems, identify SSH key pairs and trusts, and uncover misconfigured sudoers files that can increase the risk of unauthorized privileged escalation. ƒ
  • Privileged domain accounts. Discover dormant or unprotected privileged domain service accounts that have access to critical assets or services. ƒ
  • Pass-the-Hash vulnerabilities. Locate password hashes vulnerable to theft, and gain a visual map of Pass-the-Hash vulnerabilities and potential pathways to sensitive data and critical assets. ƒ
  • Hard-coded application credentials. Identify systems that have embedded, hard-coded or exposed credentials in plain-text, which can be captured by malicious attackers inside the network.

Download the CyberArk DNA whitepaper.

Or fill out the form to receive your free assessment.


2017 Cost of Data Breach Study

Last year IBM and Ponemon Institute researched the average total cost of a data breach. It became clear that the average total cost of a data breach is $3.63 million. Are you interested in reading more about this research? Fill in the form to receive the full study.The average cost per stolen record went down this year by 10%, from $158 in 2016 to $141 in 2017. This sounds like good news, but the amount of breaches that took place went up by 1.8%. On average the amount of stolen records per data breach was 24.000. 

$141 is the average cost per lost or stolen records


Get your whitepaper here


About SecurIT

Founded in 1999, SecurIT has over 18 years of extensive experience of designing, implementing, maintaining large Identity Management/Governance infrastructures. With more than 30 specialists permanently employed in the Netherlands SecurIT offers its customers high quality consultancy, implementation, management and support services (24*7). 


GDPR and PSD2

For professionals in security, identity management and access management (IAM) 2018 will be a very important year. As of May 25th all companies and other organizations must comply with the new GDPR regulations and as of Saturday January 13th PDS2 will be a fact of lite for the entire EU. When thinking of customer privacy and processing consumer data, obligations pile up. The question is: are these opportunities or barriers for business development?

In co-operation with partner IBM, SecurIT invited professionals for a ‘round table event’ end of last year in the Boardroom of the Rembrandt Tower in Amsterdam. Those attending discussed the impact of the new legislation on IAM.

The event was kicked-off by Angélique van Oortmarssen (KPMG) and Sonny Duijn (ABN AMRO). Ms. Van Oortmarssen spoke on GDPR and mr. Duijn shared his views on how PSD2 will impact retail business.

After these two short briefings the conversation concentrated on how companies need to adapt their own IT-infrastructure and open access digital platforms to benefit from the new opportunities GDPR and PSD2 will offer. Especially the impact on the financial services sector and retail was discussed.

An article by Sonny Duijn on the impact of PSD2 on retail is available here. A publication by Angélique van Oortmarssen can be downloaded here.

Download the full Round Table article


SecurIT Belgium has been renamed to TrustBuilder Corporation

Our Belgium sister company SecurIT b.v.b.a. has some exciting news to share with you. Just before 2018 they announced that SecurIT b.v.b.a will be renamed to TrustBuilder Corporation N.V.
Which means that their main focus will be further developing and selling the product. TrustBuilder Corporation in Gent and SecurIT in Amsterdam will remain sister companies.

The name and type of the company have but changed but it’s not a new company. This means all existing contracts will remain unchanged. All customers and suppliers will be notified about this change.

To achieve the short term goals for 2018 a new board of directors has been formed for TrustBuilder Corporation in Gent:

Walter Beyen                   President of the Board

Marc Vanmaele               Board member and CEO

Nils Meulemans               Board member

Rob Bus                           Board member

Jan Valcke                        Board member (independent, non-shareholder)

The mission of SecurIT in Amsterdam will remain unchanged: Selling, implementing and supporting the best Identity & Access Management software of third parties such as: IBM, CyberArk and TrustBuilder.

For more information regarding this change and TrustBuilder, please visit: https://trustbuilder.com/

For the full press release, please download the following PDF: https://goo.gl/oUkMPu