In the previous three posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information security in enterprises and the causes for security incidents. In part-3 of this series, we discussed how lack of internal controls, access restrictions, centralized management, accountability, strong policies and haphazard style of privileged password management give room for security incidents. Let us now analyze the activity monitoring scenario …
How do you control concurrent privileged access to sensitive IT resources?
In enterprises, quite often, many administrators might be accessing a system in production environment concurrently.
Privileged password management: Protection alone is not sufficient
Privileged password management has now emerged a key aspect of IT management. With ever-increasing number of privileged identities in shared environment, protecting the administrative passwords is absolutely essential, but that alone is not sufficient