Securing Privileged Accounts

May 7, 2015

Table of Contents

    Businesswoman holding tablet pcWhen managing privileged accounts on your network there is a particular feeling that you want to avoid. You, and your information security team, should never feel like a game of hide-and-seek has broken out. On average, there are three to four times more shared and privileged accounts than employees in an organization. So while you’re company roster is fairly manageable, let’s say 200 employees, there is a potential to have 800 privileged accounts.

    That’s 800 different ways for an outsider to exploit your company’s bottom line and sensitive data … and that’s just the outsider! What if you have a disgruntled employee who is leaving for a competitor? What if an employee is tired of living life at the bottom of the ladder and wants to get rich quick? Access to privileged accounts could make it difficult to prevent a breach from happening.

    Plus, it’d be easier to manage if the accounts only lived in one place. They don’t. Privileged accounts routinely exist in multiple places, including desktops, servers, databases, network devices, virtual machines, application code, and even web-based interfaces. At the end of the day, you should be able to understand the map of where your privileged accounts live not just for security purposes, but compliance regulations as well.

    How do you do it? Register for the Discover, Understand and Audit Privileged Account Credentials webinar. The speaker is Barak from CyberArk. With a strong technical background, Barak is one of the industry’s leading minds in this crucial area of information security including Regulatory Compliance, Policy Management, Access Management and specifically the current threats surrounding privileged access to the highest risk assets within the enterprise.

    You’ll learn why securing your privileged accounts is paramount to security.

    priviledged_user_account