dcsimg

PAM Solutions: Critical to Securing Privileged Access

  • PAM Solutions: Critical to Securing Privileged Access-

    Leverage purpose-built tools to manage these credentials

    Typical IAM products don't adequately provide the level of security controls and rigorous scrutiny that is needed to manage privileged accounts, said Wenzler. Administrator accounts require a different type of management that purpose-built, enterprise-grade PAM tools provide. This includes encrypting the passwords to prevent anyone from knowing or discovering what it is, integrating with a variety of applications, operating systems and devices to rotate and change the passwords on a regular basis, monitoring and logging activity down to the keystroke, and alerting the proper employees when some sort of unauthorized use of these critical credentials takes place. Modern PAM tools can accomplish all of this and more, and any organization with an IT infrastructure should implement some version of this to protect these types of accounts.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

PAM Solutions: Critical to Securing Privileged Access

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • PAM Solutions: Critical to Securing Privileged Access-6

    Leverage purpose-built tools to manage these credentials

    Typical IAM products don't adequately provide the level of security controls and rigorous scrutiny that is needed to manage privileged accounts, said Wenzler. Administrator accounts require a different type of management that purpose-built, enterprise-grade PAM tools provide. This includes encrypting the passwords to prevent anyone from knowing or discovering what it is, integrating with a variety of applications, operating systems and devices to rotate and change the passwords on a regular basis, monitoring and logging activity down to the keystroke, and alerting the proper employees when some sort of unauthorized use of these critical credentials takes place. Modern PAM tools can accomplish all of this and more, and any organization with an IT infrastructure should implement some version of this to protect these types of accounts.

Data breaches as a result of compromised privileged access are widespread, which is one reason why Matt Dircks, CEO with Bomgar, predicted that we’ll see more and serious breaches and security incidents involving privileged access. “Hackers need high-level access, which they get through targeting privileged users like IT professionals, CEOs and vendors via phishing or malware to achieve their financial goals or other motivations,” Dircks said in an email comment. “These users are targeted by the threat actor because they are likely to have access to other privileged credentials that the hacker can leverage to increase dwell time and compromise their target.”

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution.

“PAM and its automation are crucial to minimizing risk and losses caused by insiders and intruders that steal credentials or exceed their authority,” said Philip Lieberman, president of Lieberman Software. “The technology reduces the labor of IT to maintain compliance and radically reduces the labor costs of changing passwords by hand.”