How do you share privileged passwords in your enterprise? [Part-2]

In the previous post, we had highlighted the casual manner in which privileged passwords are shared among various works groups in enterprises. Let us now...

Password Manager Pro 2 min read Read

How do you share privileged passwords in your enterprise? [Part-1]

Assume that you are an IT administrator managing servers, databases, network devices and numerous other IT applications.  All these resources are accessed/controlled through administrative passwords...

Password Manager Pro 2 min read Read

The price for information security shortcomings …

Just about four weeks back, the security incident in that company came to light. Today, the company has filed for bankruptcy. The security breach has...

Password Manager Pro 3 min read Read

Allowing temporary access to sensitive IT resources

Assume the scenario below: You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A...

Password Manager Pro 1 min read Read

Deprovisioning administrative access: How careful are you?

FBI investigation on Shionogi security incident reveals the involvement of a former employee Lord Tennyson’s immortal words “Men may come and men may go, But...

Password Manager Pro 3 min read Read

An automated solution to enforce IT policy on standard password practices

Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among...

Password Manager Pro 2 min read Read

Privileged password management: Protection alone is not sufficient

Privileged password management has now emerged a key aspect of IT management. With ever-increasing number of privileged identities in shared environment, protecting the administrative passwords...

Password Manager Pro 2 min read Read

Do you still keep your administrative passwords in text files and spread sheets?

Modern IT and other enterprises are heavily dependent on servers, databases, network devices, security infrastructure and other software applications for their day-to-day operations. These infrastructure...

Password Manager Pro 2 min read Read