Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.
On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.
Not too long ago, I was sitting in a room with a very fluffy sales guy. In between words such as “we’ll make this happen” and “leave it with me, I’ll get it sorted” he asked the question “What is Privileged Account Management”?
In a survey of more than 100 customers, those customers indicated that BeyondTrust’s end to end privileged account management capabilities were a competitive differentiator versus other options in the privileged account management market.
This webinar looks at using technologies native to Windows to minimize the risk of system and data compromise, including solving problems with legacy application compatibility in least privilege environments, application control, User Account Control (UAC), and embracing Microsoft’s application architecture (Windows Store apps) in Windows 8.
IT has always been reluctant to remove administrative privileges from end users for several reasons. The first that comes to mind, and shouldn’t be overlooked, is the political challenges of such a move. Taking away a perceived privilege can be difficult, much like denying a person their freedom, so a change in IT policy has to be managed carefully to ensure users and management are onboard.
Cisco has indicated that hackers have compromised Cisco routers in several countries using valid administrative credentials or physical access to the devices to perform their malicious activities. In addition to weak physical controls, what are some other “gotchas” that you should be aware of when securing your network devices?
In a survey of more than 50 customers, those customers indicated that higher productivity as a result of using BeyondTrust solutions was a competitive differentiator versus other options in the privileged account management market.
2015 has seen a staggering number of high profile data breaches and attacks, covering almost every major industry segment imaginable. There have been several major attacks on healthcare organizations, resulting in medical and patient data stolen.
TechValidate research conducted a a survey of more than 100 BeyondTrust customers, those customers indicated that BeyondTrust’s reporting and analytics was a competitive differentiator versus other options in the privileged account management market.