Trends to look for next week at RSA Conference 2018

April 12, 2018

Next week (April 16-19) is the 2018 RSA Conference at the Moscone Center in San Francisco, and there’s good news: it’s not too late to register for a complimentary Exhibit Hall Only Pass using the Centrify entry code X8ECENTR. You’ll get free admission to the Exhibit Hall, Wednesday through Friday keynotes, select sessions throughout the week, and several other events you can learn about here.

If you’re on the fence about whether or not to attend, here’s a preview of the topics we expect to generate the most RSA buzz. If any of these interest you, register, and be sure to stop by the Centrify booth.


Machine learning and AI take center stage

In the world of security, machine learning and AI have the potential to drive a true paradigm shift. Every individual user interacting with corporate resources has a unique signature that AI and machine learning can identify and monitor for baseline deviations. The ability to learn enough about a user to recognize atypical behaviors, and then take appropriate action in real time is a game changer.

This is especially relevant as the volume of endpoints increases with the proliferation of IoT devices — a scale so overwhelming that no organization will be able to monitor, evaluate and respond without the assistance of AI and machine learning.

Centrify incorporated machine learning into our Zero Trust Security solution some time ago. Today, Real-Time Analytics are a key component in keeping our customers’ infrastructures safe. Nearly every security solution can benefit from AI and machine learning, so expect virtually everyone to be talking about it.

Blockchain hype hits new high

As Centrify predicted earlier this year, blockchain technology is making waves across the industry in 2018. Eventually, we’ll see the benefits of this technology, but currently we’re in the early research stages -- gaining an understanding of its potential and its impact. Right now, it’s more about speculation than solving real-world problems. Think the consumer Internet circa 1993.

And just like the Internet in ’93, we have cheerleaders and detractors. Just this week, a CNBC article called blockchain systems “a bad vision for the future,” and “the least trustworthy systems in the world,” while another CNBC article (posted six days earlier) noted that block chain had grabbed the attention of investors,” and said its “transparency, tamper-proof record and decentralized nature make the cryptocurrency vehicle more secure than any repository under the control of one entity.”

The jury’s still out, but just as we saw financial fraud technologies mature over the last several years, blockchain could eventually evolve into a vehicle that decentralizes and democratizes identity by giving individual users more authority over it.

One thing is clear: It will take several years before vulnerabilities can be addressed and the blockchain technology is considered mature enough to act as a basis for enterprise security. That, however, won’t prevent us from talking about it.

Zero Trust Security and Next-Gen Access break through the noise

Zero Trust should be the buzz of the conference. Why? Because Zero Trust isn’t just a new marketing message – it’s an approach to security that is addressing the key attack vectors facing organizations of all sizes.

Most organizations realize that traditional security models haven’t been effective for years and so they’ve been remarkably receptive to evaluating new security models and strategies. That’s driven rapid awareness of Zero Trust and security vendors have responded with commercial solutions.

Centrify is powering its Zero Trust approach with Next-Gen Access.

Where traditional access management technologies consist of multiple software and hardware components used to secure subsets of resources within an organization, Centrify’s Next-Gen Access (NGA) provides a holistic approach. It combines Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM) in an integrated solution to provide secure access to apps, endpoints and infrastructure.

NGA enables the shift from “trust, but verify” to “never trust, always verify.” It knows every user, recognizes every device, intelligently limits access and privilege, and allows policies to learn and adapt without impacting user experiences.

If you’re interested in learning more about Centrify’s Next-Gen Access, come see us at RSA in booth 501 in the South Hall. We’ll be offering NGA demos and discussing why Zero Trust is the future of cybersecurity.

This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.