In the previous two posts , we discussed the casual manner in which privileged passwords are shared among various works groups in enterprises and the...
How do you share privileged passwords in your enterprise? [Part-2]
In the previous post, we had highlighted the casual manner in which privileged passwords are shared among various works groups in enterprises. Let us now...
How do you share privileged passwords in your enterprise? [Part-1]
Assume that you are an IT administrator managing servers, databases, network devices and numerous other IT applications. All these resources are accessed/controlled through administrative passwords...
The price for information security shortcomings …
Just about four weeks back, the security incident in that company came to light. Today, the company has filed for bankruptcy. The security breach has...
Perils of ‘Static’ Windows Service Accounts
Windows Service Accounts, used by the system programs to run application software services or processes often possess higher or even excessive privileges than normal user...
Allowing temporary access to sensitive IT resources
Assume the scenario below: You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A...
Deprovisioning administrative access: How careful are you?
FBI investigation on Shionogi security incident reveals the involvement of a former employee Lord Tennyson’s immortal words “Men may come and men may go, But...
An automated solution to enforce IT policy on standard password practices
Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among...
Privileged password management: Protection alone is not sufficient
Privileged password management has now emerged a key aspect of IT management. With ever-increasing number of privileged identities in shared environment, protecting the administrative passwords...