BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Identity Management is Best in Enterprise Security

Post by Peter McCalister March 14, 2012

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to
measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could inhibit our ability to accomplish our objectives. In an enterprise situation, this model acts as a critical gauge- one which separates compliant from noncompliant, secure from insecure, and controlled from chaotic.

So what security projects in our organizations qualify as “best?” I’ll tell you right now it boils down to identity management. Security as a whole is critical for every organization. But at the core of every security functions ist he obligation to protect sensitive assets (be it data, machines, ideas, etc.) from harm. And where does that harm stem from? People! So it makes sense that protecting critical data from people should get considerable attention from a security standpoint. What should get even more consideration is defending those assets from the most dangerous type of threat- people who have unrestricted access to said information.

Identity management is the key to having the “best” in enterprise security. This probably sounds familiar- it’s something we’ve maintained since we started in the business over 25 years ago. According to Gartner, however, business are STILL not managing the identities of their employees very well. In fact just yesterday, Gartner Analyst Bob Blakely spoke to the Gartner Identity and Access Management Summit in London about how critical the management of identity is. According to this article, he specifically emphasized that, “cleaning up Active Directory to manage identity based on attributes rather than hierarchy should be a priority for 2012.”

So how can you improve the way you manage the priviles of your employees and third party contractors? It comes down to this: implement a least privilege solution in your organization. Without such a thing, it’s impossible for you to achieve “best” when it comes to the security of your company. Click here for more information on how to take the next steps in securing your IT environment.

Leave a Reply

Additional articles

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,

Heartbleed – When OpenSSL Breaks Your Heart

You’ve likely heard about the recent OpenSSL vulnerability, CVE-2014-0160, dubbed Heartbleed. The main takeaway of this vulnerability is that attackers can use this to obtain things like secret keys used for X.509 certificates, user names and passwords, instant messages, emails, and other highly sensitive information. For a technical analysis of the bug, check out this…

Post by BeyondTrust Research Team April 8, 2014
Tags:
, , ,