Abstract
Enterprises making use of various IT systems (servers, devices, applications etc.) face numerous challenges due to the proliferation of administrative passwords (also called as privileged passwords). This white paper discusses the problems associated with administrative password proliferation with special reference to the issues related to shared administrative passwords and service accounts. The ways to tackle the challenge, the importance of effective password management, the need for enterprise password management applications to prevent unauthorized access to passwords and the vital requirements that one should consider before zeroing-in on a password management solution, have been dealt with.
Abstract
Enterprises dealing with public funds are required to comply to Sarbanes-Oxley (SOX) Act. Organizations are looking for a single, complete, low-cost, enterprise-wide solution that could take care of all their SOX-compliance needs. This White Paper discusses the SOX compliance challenges and the problems faced by the IT administrators, who are mandated with the task of ensuring compliance to SOX. It explains how Privileged Identity and Information Management (PIIM) solutions could ensure effective internal controls and serve the enterprise-wide SOX-compliance needs. The vital ingredients that one should expect in a PIIM solution and the factors to ponder before zeroing-in on a PIIM solution, have also been dealt with.
Abstract
Administrative passwords are literally ‘aplenty’ in enterprises of all sizes. They are mostly insecurely shared and lie scattered in the enterprise leaving little scope for any internal controls. This white paper discusses the security threats associated with the password sharing in enterprises. Though the security and operational problems caused by shared administrative passwords are so obvious, no organization can afford to eliminate them altogether. The ways to tackle this challenge, the importance of effective Shared Account Password Management and the need for enterprise password management solutions have been dealt with.
Abstract
With cyber-crimes looming large, effectively securing sensitive data has emerged a big challenge for government agencies and military establishments. As they embrace new technologies, newer threats keep pace. Though the IT infrastructure of government agencies face both external and internal security threats, of late, internal threats seem to be far more alarming as many of the reported security incidents have been caused by malicious insiders having authorized or unauthorized privileged access to the government IT resources. Analysis by IT experts has revealed that insider threat is growing at unprecedented rates. This paper analyzes how insider threats stem in government agencies, the ways to tackle the challenge and also brings out the importance of controlling access to Privileged Passwords.
Advisory
Abstract
Of late, cyber-criminal activities across the globe have assumed such grave proportions that all enterprises - big and small, are exposed to security breaches and identity thefts of various kinds. Many sabotage were found to have been caused by the insiders of the enterprises - either disgruntled staff or greedy techies or sacked employees. As stolen identities seem to have served as the ‘hacking channel’ for many cyber-crimes, improper management of the administrative passwords is believed to be at the root of a good number of security threats. This paper discusses the causes of security incidents in detail and suggests ways to effectively tackle the challenge.