Skip to main content

Growing Disparity Managing Privileged Access in our ever-connected world



There are lots of wanderings from tiers, end-users and from companies of all sizes when it comes to security and data privacy in our ever-connected data-driven digital world.

Therefore, it is indispensable to recall that, Companies or organizations that employ best practices and use practical solutions to restrict access and monitor conditions are far better equipped to handle today’s threat landscape.

We have captured for you a new study from BeyondTrust that unveiled the results of its definitive Privilege Benchmarking Study based on a worldwide survey of IT professionals. The study highlights a daunting gap between organizations that adhere to best practices for privileged access management. 

Key findings are indicating that,  
1.      Only 14 percent regularly cycle their passwords, leaving systems exposed to breaches,
2.    Just 3 percent watch/terminate sessions in real time,
3.    52 percent “just know” what the risks are, but aren’t doing enough about it,
4.    Federal Government Vulnerable to Breaches, despite a high level of awareness of the threat. 

For organizations looking to reduce the risk of a damaging data breach as a result of privilege abuse or misuse, BeyondTrust has developed five recommendations based on the Privilege Benchmarking Study:
  • Be granular: Implement granular least privilege policies to balance security with productivity. Elevate applications, not users.
  • Know the risk: Use vulnerability assessments to achieve a holistic view of privileged security. Never elevate an application’s privileges without knowing if there are known vulnerabilities.
  • Augment technology with process: Reinforce enterprise password hygiene with policy and an overall solution. As the first line of defense, establish a policy that requires regular password rotation and centralizes the credential management process.
  • Take immediate action: Improve real-time monitoring of privileged sessions. Real-time monitoring and termination capabilities are vital to mitigating a data breach as it happens, rather than simply investigating after the incident.
  • Close the gap: Integrate solutions across deployments to reduce cost and complexity, and improve results. Avoid point products that don’t scale. Look for broad solutions that span multiple environments and integrate with other security systems, leaving fewer gaps.

Comments

Popular posts from this blog

IBM Cloud, Bluemix + Apple Swift for mobile app front-end and back-end development

It is exciting to see progressively that, the compelling open source architecture brings peace in minds and boosts deep innovation within leading tech companies.Introduced in 2014, Swift which is henceforth open sourced is becoming one of the fastest growing and most widely used programming languages.
The momentum is profound at IBM with the release of its Swift Sandbox for early exploration of server-side programming in Swift.
By to bring Swift to the Cloud IBM is sharing its deep understanding of the advantages of Swift and the knowledge; the company is committed to maturing the use of Swift as a server-side language for enterprise development with the goal to break down barriers between front-end and back-end development, which can provide enterprises a single language to build rich experiences and back-end business logic.

Integrated Email in our mobile-driven world.

Email remains our faithful companion, when it comes to interact with others anywhere and anytime. With the increasing adoption of social platforms, the flexibility and the productivity brought by the emerging technologies, the traditional inbox becomes an intelligent and intuitive tool that makes you more effective from anywhere.
It can automatically surface your important email; help you, work across all your accounts; help you focus on what matters; schedule what you want at any time you want; share available times, schedule meetings; View and attach files from your Dropbox, Google Drive, Microsoft OneDrive and email accounts with just a few taps. Integrated email also helps you find your important emails, people and files; Discover the people with whom you communicate most; Access all related emails, meetings and files to manage relationships better than ever.
Acompli, paves its way within this vertical. 
It supports Microsoft Exchange, Office 365, Google Apps, Gmail, iCloud, Yahoo, Ou…

4D Geographic Information System (GIS) data

It is interesting to observe that, vendors are focusing on the development of 4D GIS software. 4D GIS data includes 2D data, 3Ddata, and data regarding time change. An integrated database with real-time monitoring is required to generate 4D data. 
4DMapper is an Australia-based company that puts multi-source and multi-format geospatial data, including 3D and 4D GIS, on the cloud and streams it to browsers after rasterization and vectoring.