news
Microgaming
secures cloud
strategy with
Netskope
etskope, a leader in cloud
security, has announced that
award-winning Isle of Man
based online gaming software supplier
Microgaming is using Netskope’s
Security Cloud. This move is designed to
support the movement of key business
applications to the cloud.
N
The Netskope Security Cloud provides
visibility and real-time data and threat
protection when accessing cloud
services, websites and private apps from
anywhere, on any device.
With the intention of migrating to the
cloud with Office 365, Microgaming
selected Netskope’s combined Cloud
Access Security Broker (CASB) and
next generation Secure Web Gateway
(NG-SWG) to map every web and cloud
transaction, enabling it to understand
user activity across all SaaS and IaaS
services and any website.
Netskope also unifies Microgaming’s
policy management across both cloud
and web traffic from a single cloud-
native platform.
Microgaming’s Information Security
Manager Samantha Hoffmann said: “We
have been able to migrate to the cloud
because our Netskope Security Cloud
has given us the borderless visibility and
control we need.”
Netskope is providing Microgaming
with real-time controls between users
and the cloud, the protection of
sensitive information and the ability to
control shadow IT. Netskope
immediately identified 700 unsanctioned
cloud apps being used within
Microgaming and Netskope’s Cloud
Confidence Index (CCI) provides
on-going assessment of the security
credentials of any cloud application.
6
VENAFI REVEALS RESEARCH ON
SECURITY CONTROLS FOR HUMAN AND
MACHINE IDENTITIES
enafi, a leading provider of
machine identity protection,
has announced the results of
a study comparing security controls
for human and machine identities.
V
People rely on usernames and
passwords to identify themselves to
machines so they can gain access
to data and services. Machines also
need to authenticate themselves to
each other so they can communicate
securely, relying on cryptographic
keys and digital certificates, which
serve as machine identities.
To better understand the gap
between implementation of security
controls for human identities and
those for machine identities, Venafi
sponsored a survey that evaluated
similar security controls for each
type of identity.
For example, just half (54%) of
organisations have a written policy on
length and randomness for keys for
machine identities, but 85% have a
policy that governs password length for
human identities.
Additional findings from the study include:
• Less than half (49%) of
organisations audit the length and
randomness of their keys, while 70%
do so for passwords
• Only 55% have a written policy
stating how often certificates and
private keys should be changed,
while 79% have the equivalent policy
for passwords
• Only 42% of organisations
automatically enforce the rotation
of TLS certificates, compared with
79% that automatically enforce the
rotation of passwords
Issue 22
|
www.intelligentciso.com