It’s been proven time and time again: unmanaged, unmonitored privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions.
Due to this common practice Privileged Access Management (PAM)— the monitoring and protection of super user accounts— has emerged as one of the most important aspects of Identity and Access Management (IAM) , and cyber security writ large, today.
But in an organization with thousands of IT assets, it can be difficult to securely manage access to privileged accounts for several reasons:
• There are thousands of privileged passwords.
• Administrator passwords exist on each device and application.
• It is difficult to coordinate changes to shared passwords.
When there are many shared, static passwords, former IT staff retain sensitive access after leaving an organization. It can also be difficult to trace changes back to individuals who made them.
In this hour-long webinar from Hitachi ID, experts discuss best practices for privileged access management to remediate these problems.
Check out these additional resources:
Latest posts by Jeff Edwards (see all)
- Here’s What the Average Data Breach Cost in 2016 - January 20, 2017
- IoT IAM Market Will See Explosive Growth to $5B by 2021, Report Says - January 19, 2017
- 2016’s Worst Passwords Are In, And The Results Are Embarrassing. - January 16, 2017