It has been more than 10 years since the context -recognized security measures were proposed.That idea is simple.Use factors such as location information, device, and accessed information to determine the types and strength of the necessary security measures.By using information about the situation, such as ID, location information, time, device type, data business value and reputation, you will be able to make more efficient, effective and accurate security decisions in theory.。
In the last decade, technology and network have evolved to the fact that such systems can be realized and commercialized.However, since the platform and application are not one, it is difficult to determine the dissemination of context -recognized technology.
According to Adrian Davis, Managing Director (ISC) 2 management director."The number of suppliers for context -recognized products is increasing, and some have already provided integration platforms, such as Cisco PXGRID. However, it seems that the introduction to companies has not progressed much.Other projects such as cloud and cyber defense are prioritized, and most of the limited budgets are used, and such technologies may require considerable investment and network infrastructure. "
Some organizations have budgeted by BYOD and cloud strategies from context -based security, while others are encouraging them to adopt.This is because the importance of context -based security is increasing, as cloud and mobile computing are burying around the once strict network.
Furthermore, with the advances in data generation, collection, and analysis, the network has become more intelligent to fast -moving and unexpected situations.Thanks to this, companies and banks have tracked suspicious behavior on the access and ID management system, and have been able to wash potential data leaks and fraud.
It is also pointed out that algorithms that support such systems have advanced, and the amount of history data has increased, making it possible to make decisions based on even higher accurate contexts, Dave, a senior survey analyst of ISF (ISF).Clemente."But this is not just a matter of technology. It is a human element that focuses on the problem and the core of the problem. After all, determining what corresponds to suspicious behavior and designing algorithms accordingly.It's a human "
ISF features this issue in recent reports and introduces not only to make employees aware of basic security issues, but also to change their actions.
To read more, press the [Read more] button to register or log in.
Variability of container security that companies should definitely know
In fact, how to secure the security of containers with many risks
Micro services increase security complexity
The secret of the secure cloud service construction practiced by AWS