Skip to main content

NEWS

PATECCO Will be an Education Seminar Sponsor at E-Crime and Cyber Security Conference in Frankfurt

For a second time, next year, PATECCO will take part in the 14th edition of the conference E-Crime and Cyber Security. It will take place in Frankfurt, Germany, on 28th of January 2020. The company will be an Education Seminar Sponsor and will present its best practices in the field of Identity and Access Management.

The event is the leading market place for visitors of the banking industry and for IT service providers which activity is focused on the latest technological developments and IT trends.  The conference provides a good overview about the actual IT security sector and gives the opportunity to find out how the IT professionals in the organisations are meeting their goals, how they are addressing business priorities and operational objectives in order to reduce risk, protect data, ensure compliance and strengthen security posture.

During the one-day event, PATECCO will have a counter where its team members will welcome each visitor who is interested in Identity Access Governance IAG, Privileged Account Management (PAM), Security Incident and Event Management SIEM, Management and IT-Consulting, and Cloud Access Control. Each one, who is interested in these specific areas, will be invited in a personal meeting where all details will be considered.

Photo credit: akjassociates.com

Besides, the company’s CTO – Mr. Helmut Brachhaus, who is an expert Privileged Account Management,  will speak in a 35 minute session, related to the topic about BAIT (in German – Die Bankaufsichtlichen Anforderungen an die IT) or said in English – “The banking supervisory requirements for IT”.

Mr. Brachhaus will describe case studies that detail how security frameworks and methodologies are being applied in the real world to help lines of business and the board take advantage of new opportunities, increase productivity, enable agility and decrease cost. He will also share critical and unique insights that can inform the direction of business, technology and security strategy and practical steps that can help assess exposure to, articulate and proactively mitigate the impacts of emerging risks.

PATECCO is an international company, dedicated to development, implementation and support of Identity & Access Management solutions. Based on 20 years’ experience within IAM, high qualification and professional attitude, the company provides value-added services to customers from different industries such as banking, insurance, chemistry, pharma and utility.

Why Are APIs so Important to Digital Business?

Application programming interfaces (APIs) are strong foundation for highly connected enterprises. They are everywhere, global and pervasive. APIs are accelerating daily business transactions, expanding customer demand and supporting mission-critical, go-to market strategies. Conversely, accompanying the exponential adoption of APIs is the urgent need to maintain a thorough API security strategy that blocks potential daily threats generated by huge volumes of transactions and data sharing between you and your external customers or partners.

What are actually the APIs?

APIs are tools that let you easily expose your unique data and services in web apps, mobile apps and other connected devices. They become the standard way of connecting applications, data and devices, providing services directly to partners and creating new models for doing business. API Gateway is able to provide security and peace of mind in this API-connected world.

APIs are important to digital business, because they simplify how two different programs communicate with one another. They are also driving a new wave of innovation which is based on shared services leveraging DevOps. In this way APIs enable companies to grow their business more quickly and to accomplish any business goal by increasing efficiency through business transformation.

Which are the basic API Platforms?

The best breed of API management platforms consists of three basic building blocks. Assembled together, these will ensure that all APIs exposed by the platform are secured and governed and that there is full visibility on their consumption.

API gateway. API gateway is a valuable security enforcing component. It acts as a single point of entry for all consumers, insulating them from multiple service providers, geographical locations, etc. API Gateway could manage, deliver, and secure enterprise APIs, applications, and consumers. It provides core services such as security (for example, authentication and authorization), connectivity with a range of different protocols, virtualization, scalability and elasticity, high availability, and manageability.

API manager. API manager is a platform for managing the lifecycle of APIs. This includes the processes of creating, publishing, promoting and governing APIs in a secure and scalable environment. The API manager enables API producers to engage partners and developers and help them onboard, manage, and test their Apps. API providers can publish, document, promote, and support their APIs, and app developers can easily find, consume, and get support.

API analytics. API analytics provide real-time insights into the business and optimize the delivery and value of APIs. They leverage the collected API data to generate predictive analytics dashboards analyzing trends and outliers. API Analytics and reporting includes both engineering focused metrics such as performance and uptime, but also tracking customer and product metrics such as engagement, retention, and developer conversion. There are a variety of methods to perform such analysis which includes basic SQL and Excel to purpose built API analytics platforms.

Which are the benefits of API Management?

1. Centralized Visibility

The API connections throughout your organization show up in a centralized panel. You know what’s going on with your published APIs and third-party APIs in your network. This governance helps you avoid security vulnerabilities, cut down on redundant APIs, and identify gaps your developers can address. This top-down view proves particularly useful if you’re looking for large-scale unusual behavior, such as a developer attempting to bypass API limitations to access unauthorized data.

2. Better developer and end user experiences

Managed APIs enable organizations to not only make their digital assets more easily available to developers, but also collect analytics and generate insights about how and by whom APIs are being used. These insights help organizations to iterate their APIs, so developers are increasingly empowered to create better experiences for end users. Well-managed APIs help business to iterate not only quickly, but also intelligently.

3. Fewer security worries

An API management platform provides a common plane to apply security precautions while still allowing individual teams and developers to work relatively autonomously. Robust API security capabilities include authentication mechanisms to control who can access APIs, intelligent security algorithms to combat bots, and tools to enforce traffic quotas and other policies.

4. Multi-cloud acceleration

Modern IT ecosystems are heterogeneous mixture of modern SaaS and cloud services. Businesses need the agility to freely connect these systems and to locate applications and data where they will be most useful. For that purpose, APIs abstract this complexity into an interface that developers can easily use to connect and leverage apps and data across clouds or across hybrid deployments. Besides, API management platforms provide control over and visibility into this process.

5. Better software connectivity for enhanced productivity

Many organizations use integrated software solutions, such as one umbrella software that houses their marketing and sales efforts and HR and finance processes. For those who have more disparate software solutions – particularly smaller businesses that have been adding solutions as they grow – APIs can increase connectivity and communication between software to streamline operations and improve efficiency.

Investing in an APIs could bring better business results, because they are a tool that has created more flexibility and allows companies to be more proactive and responsive to internal and external needs. Overall, organizations who need more agility or greater communication capabilities have turned to an API strategy to help create a stronger company business. API Management accelerates the changes in digital transformation by providing you with the capabilities you need to bring systems together, protect these integrated solutions, enhance customer experience, and unlock new business opportunities.

More about API platforms you can read in PATECCO previous articles here and here.

Why IAM is the Leading Solution For the Financial Institutions?

Identity and access management (IAM) is famous for managing access to enterprise resources. It an essential element of any information security program and one of the security areas that users interact with the most. Banks all over the world made it easy and convenient for the customers to use mobile facilities for paying bills, checking account details or even apply for loans and credit cards. That’s why app-driven mobile activities require the need for Identity and Access Management (IAM) capabilities that could be delivered to both mobile devices as well as mobile apps.

In the business environment of financial institutions it’s mandatory to keep control and compliance across complex IT Systems. These are one of the key factors to uphold a strong reputation and trust, while enabling employees and customers easy access to different systems and applications. More and more financial supervisory authorities across the world make it mandatory for the banks to possess and implement systems ensuring that access rights are both assigned and recertified properly. The financial sector has to deal with increasing national and international industry regulations such as EU GDPR, BaFin, Basel II, SOX, and Solvency II.

Identity Management in Online Banking

For financial institutions, the proper identification of the customer to the bank and the bank to the customer is of a great importance for secure providing financial services to customers. Individual and business customers are increasingly using the online platforms to access banking solutions. Accessing this kind of channels is a low cost, highly efficient method of delivering financial services. So what banks need is applying risk management controls necessary to authenticate the identity of retail and commercial customers accessing Internet-based financial services. That is possible by relying on IAM Solutions. But what exactly they provide in the complex banking sphere?

IAM provides user authentication

A robust and flexible IAM system focuses on providing user authentication without impacting consumer experience, supporting dynamic cloud-based services and providing data exchange and integrating multiple consumers in a secure manner. Applying SSO (Single Sign On) mitigates risks and gives better user experience without compromising the data of the users.

IAM provides rich set of reporting and analytics features 

IAM solutions are able to provide rich set of reporting and analytics features enabling banks to proactively document usage. It also helps for collecting information about application utilization, inactive users and login activity. It identifies users who have weak passwords, get insights into users, logins, apps, events and provide audit trails for demonstrating compliance as per cyber-security, together with privacy regulations.

IAM Solutions could be flexible

IAM system could be flexible enough to fit the changing IT security environment and technological requirements, such as adapting secure systems for biometrics, sensors, and customized device authentication. 

IAM enhances regulatory compliance

Mobile apps must be secured, otherwise this could lead to unauthorized access of sensitive data such as financial transactions or credit card details or personal information by employees or any third parties. This could cause identity theft, financial fraud or malware distribution. In this case IAM system helps the banks to meet their business demands. Developing a strong IAM program prevents attacks from the tools used by cyber criminals including reconnaissance, privilege escalation, remote access, data exfiltration and social engineering.

IAM solution gives significant advantages to both financial institutions, stakeholders and consumer. Banks using powerful IAM functions possess improved data security, lower operating costs, reduced risk relating to data access, as well as efficient audit-compliant processes in observation of all relevant regulations. 

Defining the Key Capabilities and Benefits of SIEM Solutions

Security information and event management systems have the capability of collecting security log events from numerous hosts within an enterprise and store their relevant data centrally. By bringing this log data together, these SIEM products enable centralized analysis and reporting on an organization’s security events. And that’s not everything – SIEM allows IT to monitor threats in real time and respond quickly to incidents so that a damage can be prevented. Of course, we should not take into account only the external attacks – IT needs a way to monitor user activity, so that it can minimize the risks from insider threat or accidental compromise.

Different kinds of organizations use SIEM systems for different purposes, so SIEM benefits vary across organizations. This article looks at the six top SIEM benefits.

  • Real-Time Monitoring
  • Incident Response
  • Threat Intelligence
  • Advanced Analytics
  • Advanced Threat
  • Detection

These capabilities give organizations the ability to use their SIEM for a wide range use of security use cases, as well as compliance. Let’s take a deeper look at each key capability of a SIEM solution.

  1. Real-Time Monitoring

The longer it takes to discover a threat, the more damage it can potentially inflict. IT organizations need a SIEM that includes monitoring capabilities that can be applied in real time to any data set, regardless of whether it’s located on-premises or in the cloud. In addition, that monitoring capability needs to be able to retrieve both contextual data feeds such as asset data and identity data, as well as threat intelligence feeds, which can be used to produce alerts. An SIEM is able to identify all the entities in the IT environment, including users, devices and applications as well as any activity not specifically attached to an identity. A SIEM is capable to use that data in real time to identify a broad range of different types and classes of anomalous behaviour. Once identified, that data needs to then be easily fed into workflow that has been set up to assess the potential risk to the business that anomaly might represent.

2. Incident Response

At the core of any effective incident response strategy is a robust SIEM platform that makes it possible not only to identify distinct incidents, but also provide the means to track and reassign them. SIEM is be able to provide other members of the organization with varying levels of access based on their roles. Other key capabilities include the ability to either manually or automatically aggregates events, support for application programming interfaces (APIs) that can be used to pull data from or push information to third-party systems. SIEM is also able to identify notable events and their status, to indicate the severity of events, to start a remediation process, and to provide an audit of the entire process surrounding that incident.

3. User Monitoring

User activity monitoring includes the ability to analyze access and authentication data, establish user context and provide alerts relating to suspicious behavior and violations of corporate and regulatory policies. It’s critically important when the user monitoring is extended to privileged users who are most often the targets of attacks. In fact, because of this risk, privileged user monitoring is a common requirement for compliance reporting in most regulated industries. For achieving those goals there are real-time views and reporting capabilities capable of leveraging a variety of identity mechanisms that can be extended to include any number of third-party applications and services.

4. Threat Intelligence

Threat intelligence makes it easier to recognize abnormal activity such as, for example, identifying outbound connections to an external IP address. With this level of threat intelligence, analysts have the information needed to assess the risks, impact and objectives of an attack that are critical to prioritizing an appropriate response.

Threat intelligence data could be ideally integrated with machine data generated by various types of IT infrastructure and applications to create watch lists, correlation rules and queries in ways that increase the success rate of early breach detection.

5. Advanced Analytics

SIEM is able to provide advanced analytics by employing sophisticated quantitative methods, such as statistics, descriptive and predictive data mining, machine learning, simulation and optimization, to produce additional critical insights.

6. Advanced Threat Detection

Security threats continually evolve. A good SIEM solution can adapt to new advanced threats by implementing network security monitoring, endpoint detection and behaviour analytics in combination with one another to identify and quarantine new potential threats. Most firewalls and intrusion protection systems can’t provide these capabilities on their own. The goal should be not only to detect threats, but also to determine the scope of those threats by identifying where a specific advance threat may have moved to after being initially detected, how that threat should be contained, and how information should be shared.

By describing all the above mentioned SIEM features and advantages, we can conclude that SIEM is considered not only as an issue of security or technology, but as an issue of business processes and productivity! SIEM introduction should be precisely planned in order to avoid false expectations or unexpected costs later on. Our team of experienced experts is able to give you the best advice in the field of SIEM and to can support you in developing a SIEM concept in conformity with your business requirements.

How IAM Ensures Secure Access to Information Across Your Enterprise

To meet the challenges of today’s world, competitive companies need to increase their business agility in a secure environment and need to enforce the performance of their IT infrastructure. With the development of the business, enterprises now require new methods to manage secure access to information and applications across multiple systems, delivering on-line services to employee, customer and suppliers without compromising security. Companies must be able to trust the identities of users requiring access and easily administer user identities in a cost-effective way. That’s why it is important how they manage all the identities that access information across the enterprise (from employees and customers to trading partners), how they keep all interactions compliant and secure regardless of access channel, including personal devices.

More and more enterprises are undertaking significant digital transformation initiatives to integrate more applications and automate processes in a bid to increase productivity and the pace of innovation. These initiatives frequently involve the integration of information technology with operational technology, even bridging security domains, through direct integration with value chain partners. Digital transformation initiatives deliver significant value, but potentially put more resources at risk and increase the enterprise security threat surface.

Managing external identities, determining who should have access to what resources, and validating and auditing access requests to key resources across channels creates significant administrative overhead for the enterprise. The inherent risk in granting access to mission-critical resources to people and organizations outside the enterprise’s control is compounded by: lack of visibility into an external organization’s hierarchy to validate user requests for access to resources, inability to identify orphan accounts, audit whether users are still active at an organization and still need access to resources, and compromised accounts

The solution for all these business challenges and risks is Identity and Access Management (IAM). It is developed, based on the users and access rights management through an integrated, efficient and centralized infrastructure. This concept combines business processes, policies and technologies that enable companies to provide secure access to any resource, efficiently control this access, respond faster to changing relationships, and protect confidential information from unauthorized users.

Beyond the most basic function of directory services that maintain the metadata associated with an identity, IAM covers two main functions: Authentication and Authorisation.

How does PATECCO IAM solution enable you to manage your most critical identity and access management challenges?

PATECCO offers a robust set of IAM capabilities. The solution enables enterprises to centrally manage the entire identity lifecycle of their internal and external users, as well as their access to critical resources across the enterprise. The IAM platform provides a comprehensive set of capabilities to connect and manage the people, systems, processes, and things that span the extended enterprise. PATECCO IAM solution addresses identity and access management challenges in three key areas:

1. Onboarding and provisioning

 Onboarding and provisioning is a business problem, which deals with the policies, rules, technology, and user experience pertaining to creating and managing user accounts. Enterprises need robust approval-based access requests, the ability to audit access grants, and the ability to provide answers to the questions of who has what, why, and for how long?

 2. Authentication and access

With network security perimeters disappearing and data flowing freely within and between companies, identity has become the crucial point to help manage, control, and govern access to data, applications, and cloud resources. This requires the enterprise to master non-core capabilities such as single sign-on, password management, advanced authentication, role-based access control, and directory services integration.

 3. Privacy and security

The rise in awareness about compliance management—as well as the growing list of regulations on the matter such as GDPR in Europe—is driving the adoption of IAM solutions for security purposes. Enterprises must prevent sensitive information from being disclosed to unauthorized recipients. They must reduce or eliminate the risk of financial loss, public embarrassment, or legal liability from unauthorized disclosure of sensitive or critical information. PATECCO solution for IAM mitigates many of the risks inherent in a diverse, globally distributed supply chain. Starting with comprehensive identity and access management capabilities, we can ensure only the right people have access to the most trusted resources when they need them. Adding comprehensive tools for audit and attestation means that the enterprise can easily determine who has access to what resources at any time, as well as how they got access and when they actually accessed the resource.

After describing the IAM capabilities, we can conclude that the more IAM continues to evolve, the more organizations will look to broader, enterprise-based solutions that are adaptable to new usage trends such as mobile and cloud computing. Effective identity and access management processes are able to bring business value to your enterprise — reduced risk, sustaining compliance, improved efficiency and end user experience responding to the changing IT landscape.

3 Steps for Building Your Identity Management Strategy

Today a lot of enterprises rely on higher security and governance to run and keep their business successfully. We are witnessing a trend where the more connections are increasing, the more security breaches affect companies from all around the world.

The enterprises suffering such data breach problems experience significant losses in terms of recovery costs and brand damage. That hard situation comes when there is some type of “unauthorized access” (whether from internal or external threats) to corporate applications and sensitive data.  As a result, companies make a detailed review of their current Identity and Access Management (IAM) processes and after detecting some gaps, start looking for new IAM approaches. In this way they want to ensure that their organizations are safe from access-related security breaches, optimize the operational costs associated with access control and meet their internal and external compliance requirements.

Regardless what IAM system you will choose, in this article we will give you an idea of what steps to take for building an effective Identity and Access Management (IAM) strategy, focused on mitigating key risks for the organization.

1. Use federated identity management approach

Companies could implement a federated identity management approach whereby the organisation providing the data or service trusts the authentication measures in place at a collaborating organisation. If you use such an approach, it’s not necessary to share the personal details of the user requesting the access, only an assertion from the trusted party that the user is authorised to make the request. 

2. Keep a good governance

Good governance ensures that there is a consistent approach to risks and compliance across different lines of business. It is able to reduce costs by avoiding multiple, ad hoc, approaches to compliance and risk management. Identity and access governance ensures that only authorized persons have access to the confidential and regulated data.

Remember that the power of identity and access governance is in managing privacy across the enterprise. Governance is your procedure and framework that makes everything consistent across the board. That means risk management and compliance for all your lines of business.

3. Avoid multiple authentication

Authentication process is used for confirming the user identity. The typical authentication process allows the system to identify the user via a username and a password.

The less authentication your users have to go through, the better. You could have a negative feedback if users have to go through a multiple authentication levels to gain access to an email or account. Some may even find their own shortcuts, which is where problems can arise.

Single sign-on can help, but cannot resolve the problem. Users operating in an SSO environment could have negative feedback from their home and mobile workers due to the extra levels of authentication required to access the new system.

There are stronger methods of authenticating the user, including certificates, one-time passwords, and device fingerprinting. Thanks to them, could be provided a stronger combination of authentication factors.

Phases of IM Strategy

Building the Identity Management Strategy requires three distinct phases: assessment, analysis and planning, as well.

1) Assessment Phase: Assess your current infrastructure and architecture and identity-related processes;

2) Analysis Phase: Determine key technology and process gaps and identify needed identity capabilities and integration points;

3) Planning Phase: Define high-level, future-state identity architecture; Develop a phased implementation roadmap; Document and present final recommendations

In order to secure identities and data, as well as tо ensure readiness, organizations need to respond proactively to the coming changes by adapting the right strategy, operations and architecture of their IAM and its supporting tools and services.

Why Identity Governance and Administration is Fundamental to Information Security?

Cybersecurity is possible if only there is a full visibility and control of the users’ activities in the enterprise network. Within your organization, you should know who has access to what and how that access is being used. Now may be you are asking yourself: “Is my identity governance working intelligently enough?” If your answer is “Yes”, that means that your identity governance clearly monitors the complex activity of human and nonhuman actors throughout an organization and implements appropriate controls to ensure the right actors have access to the right data at the right time.

As Kuppingercole says in its reports, Identity Governance and Administration is one of the core disciplines of today’s IAM (Identity and Access Management). IGA factually is a combination of Identity Provisioning and Access Governance. IGA is one element of IAM and needs to work seamlessly with Adaptive Authentication, Privileged Access Management, and other technologies. By implementing IGI tools, you can improve visibility of how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence.

Governing Digital Identities

Almost half of data breaches happen within an organization—and the reason is a failure to govern the digital identities of employees and other users, such as contractors, partners and even software bots. Governing digital identities is as complex as it is critical to security. When roles change, access must be changed accordingly without any delay.

Nowadays leading organizations are governing the digital identities of their numerous employees. They all view identity governance as an enabler of their own transformation and larger trends such as the Internet of Things. The implementation of IGI system brings benefits such as improved security, compliance with privacy regulations and increased productivity. For large organizations the task to get users the access they require can be really time consumable. As employees and contractors work on a variety of projects, transfer departments and locations, change their job functions, and get promoted, their requirements for access constantly change. At a deeper level, system administrators require access to privileged, shared accounts that allow them to perform business-critical and administrative functions

For all of these scenarios, PATECCO provides identity governance solutions including privileged account management, which controls access to shared, root-level or admin accounts. The effective identity governance and intelligence solution provides users with proper access from the beginning to the end of the user life cycle. It also ensures that all access is approved and recertified throughout the life cycle until properly deprovisioned. The IGI solution has also the ability to identify potential risky access and risky users by analysing all user access and in this way helps for preventing insider threat attacks.Deploying an identity and access governance system offers a number of benefits. IGI Solution provides a detailed view of roles and privileges within each department of the enterprise. This results in deep insight into how access is used across the company by different users.

The access governance system enables the regulation and control of access in an efficient, systematic, and continuous manner. The access governance system positively impacts the certification process, as well. That means that certification and recertification requirements are reduced and users can be certified as required. Besides, an access governance system facilitates collaborative and analytics-based decision-making, based on the data aggregated across users and departments.

Organizations must be ready to evaluate their own capabilities and gaps against common practices for access and identity management in areas such as access certification, entitlement management, tracking and reporting. They also must be prepared to prioritize closing those gaps accordingly. Identity and access governance is just the right solution to help bridge those gaps and help organizations apply and maintain compliance.