• Solutions Review Sites
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • **NEW** Get MACHINE-MATCHED to IAM Solutions

Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services

Link to Identity and Access Management Buyers Guide

Menu

  • News
  • Best Practices
  • Best Selling Books
  • Solutions Directories
    • Identity and Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Buyer’s Guides
    • Identity & Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Vendor Map
  • Resources
  • Contact Us

Privileged Account Management #1 in Gartner Top 10 Security Projects for 2018

Posted on June 13, 2018 by Ben Canner in Identity Management News

Privileged Account Management Gartner

Technology research firm Gartner, Inc. recently released a post entitled “Top 10 Security Projects for 2018.” This post covered statements by Gartner Vice President and Analyst Neil MacDonald during the 2018 Gartner Security and Risk Management Summit. MacDonald’s speech aimed to assist new chief information security officers to prioritize their cybersecurity objectives effectively.

The number one cybersecurity priority, therefore, according to Gartner? Privileged Account Management.

Download Link to Privileged Access Management Buyer's Guide

We here at Solutions Review have written time and time again of the importance of securing privileged accounts from external and internal threat actors, as privileged users’ access can cause even more damage if it falls into the wrong hands or is otherwise misused. Over 80% of all breaches begin with weak or stolen privileged credentials, according to recent studies.   

Gartner recommends that CISOs prioritizing privileged account management in their enterprise’s cybersecurity monitor those accounts for unusual behaviors, work to secure their credentials from unwanted hands, and institute multifactor authentication (MFA) for all administrators and third parties.

Additionally, Gartner recommends instituting a risk-based approach system before implementing privileged account management changes. For our own part, we at Solutions Review recommend that you also practice role management and the principle of least privileges in your privileged account management.

Permissions even for privileged users should never be uniform but instead determined based on what users need to accomplish their roles in your enterprise—and given nothing more unless absolutely necessary. Those permissions, in turn, should be monitored and revoked if determined to be superfluous; this will minimize the damage a single misused privileged account can wreck on your network.

Gartner’s other top security projects include anti-phishing, application control on server workloads, detection and response, and automated security scanning.    

According to Gartner, just as important as what to prioritize is how you prioritize to ensure cybersecurity success: privileged account management and other cybersecurity projects ongoing projects rather than initiatives with definitive victory conditions.  

In his statements, MacDonald said: “Focus on projects that reduce the most amount of risk and have the largest business impact…These are projects, not programs, with real supporting technologies.”

Yes, cybersecurity remains as always a marathon, not a sprint, and it can be a daunting journey. However, the benefits always outweigh the risks. It’s the right time to put on your running shoes and start taking on these security projects for your enterprise.

You can read the full post here. 

Other Resources:

Privileged Access Management and Identity Hygiene

Thycotic Releases “2018 Global State of Privileged Access Management (PAM) Risk and Compliance”

5 Key Capabilities To Consider When Evaluating Privileged Access Management (PAM) Solutions

By The Numbers: Privileged Access Management

Top 4 Privileged Identity Access Management Vendors to Watch in 2018

Download Link to IAM Buyers Guide
  • Author
  • Recent Posts
Ben Canner
Ben Canner
Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner
Latest posts by Ben Canner (see all)
  • The Best Identity Governance Tools and Vendors in 2023 - December 31, 2022
  • The Best Privileged Access Management Providers for 2023 - November 1, 2022
  • The 10 Best Free and Open-Source Identity Management Tools - October 15, 2022

Share this:

  • LinkedIn
  • Twitter
  • Facebook
  • Email

Related

Tagged
  • Access Management
  • Authentication
  • Cybersecurity
  • Data Breaches
  • Gartner
  • News
  • PAM
  • Passwords
  • PIM
  • Privileged Access Management
  • Privileged Account Management
  • Privileged Identity

Post navigation

Previous Previous post: The Role of Identity in Digital Transformation
Next Next post: IAM vs CIAM: What’s the Difference?

Featured Video

IAM Solution Suggestion Engine


Download link to Identity Access Management Buyer's Guide

ManageEngine Ad
Optimal IdM Ad

Vendor Map Report Identity ManagementDownload link to Identity Access Management Vendor Map

Top Posts & Pages

  • Identity Management and Information Security News for the Week of February 3; Radiant Logic, Guardz, Legrand, and More
    Identity Management and Information Security News for the Week of February 3; Radiant Logic, Guardz, Legrand, and More
  • The 10 Best Free and Open-Source Identity Management Tools
    The 10 Best Free and Open-Source Identity Management Tools
  • Identity Management and Information Security News for the Week of January 20; Kintent, Immuta, Rubrik, and More
    Identity Management and Information Security News for the Week of January 20; Kintent, Immuta, Rubrik, and More
  • Top 9 Authentication Books for Professionals
    Top 9 Authentication Books for Professionals
  • The Top Identity & Access Management (IAM) Books You Should Be Reading
    The Top Identity & Access Management (IAM) Books You Should Be Reading
  • A Macro Look at How Cybersecurity VCs Screen Startups
    A Macro Look at How Cybersecurity VCs Screen Startups
  • Blockchain and the Future of IT Security: A Quick Primer
    Blockchain and the Future of IT Security: A Quick Primer

Featured Video

Download link to SIEM Buyer's Guide

Identity & Access Management Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Identity & Access Management and posts it here.

Related Solutions Review Sites

  • SIEM | Information Security
  • Endpoint Protection
  • Backup and Recovery
  • Mobile Device Management
  • twitter
  • facebook
  • linkedin
  • youtube
  • email
My Tweets

Free IAM Buyer’s Guide

Download link to Identity Access Management Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Identity and Access Management | Privacy Policy | Do Not Sell My Info
Top
 

Loading Comments...