Gemalto announced the launch of SafeNet Trusted Access, an access management and identity protection service, to secure cloud and on premise applications. Powered by a robust risk-based analytics engine, Gemalto’s solution delivers integrated Cloud Single-Sign-On (SSO) and Multi-factor Authentication (MFA) capabilities so companies can easily implement secure, conditional access and additional authentication levels when outlined in the policy engine.
According to recent research, enterprises in 2017 are expected to utilize an average of 17 cloud applications to support their IT, operations and business strategies. With SafeNet Trusted Access a user can log on once to access all approved applications, as defined by the policy for that application.
“The adoption of cloud apps is fast becoming mainstream. Yet IT teams lag in their ability to effectively manage and restrict access to these apps and offer their employees the convenience they expect. With SafeNet Trusted Access, IT Managers can set scenario-based policies linked to associated risk factors and implement step up authentication for a particular application or group of users, depending on the level of sensitivity and role,” said Rana Gupta, Vice President – APAC Sales, Identity and Data Protection, Gemalto.
“Historically, controlling access to resources has been ‘red-light/green-light’ or binary – you’re either allowed in or you’re not, and once they are in, most SSO offerings are blind to anything a user does once they are granted. By combining analytics with IAM, SafeNet Trusted Access provides companies with the ability to identify anomalies in access patterns that could indicate risk and help prevent data breaches,” said Garrett Bekker, Principal Analyst at 451 Research.
Gemalto’s SafeNet Trusted Access key features include:
• Scalability– The solution features built-in integration templates making it easy for companies to add new and existing cloud applications as needed
• Supports long-term IAM strategy – Companies benefit from a broad range of Gemalto’s stronger authentication methods and form factors such as one-time-passwords and biometrics
• Risk-based analytics and detailed access policies– Scenario-based policies define access controls, assess whether a login attempt is secure, apply the appropriate level of authentication and require additional security measures when necessary
• Visibility – Provides the right level of visibility into workforce identity and access activities & events
• Centralized access management– A single pane of glass gives visibility into all access events streamlining security audits, tracking and help desk requests like password resets
• Regulatory compliance– IT can ensure compliance with relevant legislation and standards using the solution’s data driven insights on user behavior, access events and policy enforcement.