dcsimg

PAM Solutions: Critical to Securing Privileged Access




1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next PAM Solutions: Critical to Securing Privileged Access-2 Next

Why do you need a PAM solution?

Your organization needs a PAM solution for two primary reasons: the volume of administrative accounts and too few admins monitoring these accounts.

In the first situation, every operating system, every IoT device, every application that supports multiple users, every web server, every piece of network equipment has administrator accounts, and should those credentials get compromised by an attacker, they can easily be used to gain access to most other similar devices, if not every device on your network, said Nathan Wenzler, chief security strategist at AsTech.

For the second reason, Wenzler added, “Some of your employees may be given administrator-level credentials (your Domain Administrators, for example), but since most privileged credentials are built-in to operating systems or other platforms, they don't typically represent a one-to-one relationship with a human administrator. That means that no one is watching over these accounts.”

Data breaches as a result of compromised privileged access are widespread, which is one reason why Matt Dircks, CEO with Bomgar, predicted that we’ll see more and serious breaches and security incidents involving privileged access. “Hackers need high-level access, which they get through targeting privileged users like IT professionals, CEOs and vendors via phishing or malware to achieve their financial goals or other motivations,” Dircks said in an email comment. “These users are targeted by the threat actor because they are likely to have access to other privileged credentials that the hacker can leverage to increase dwell time and compromise their target.”

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution.

“PAM and its automation are crucial to minimizing risk and losses caused by insiders and intruders that steal credentials or exceed their authority,” said Philip Lieberman, president of Lieberman Software. “The technology reduces the labor of IT to maintain compliance and radically reduces the labor costs of changing passwords by hand.”

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.