BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Identity Management is Best in Enterprise Security

Posted March 14, 2012    Peter McCalister

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to
measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could inhibit our ability to accomplish our objectives. In an enterprise situation, this model acts as a critical gauge- one which separates compliant from noncompliant, secure from insecure, and controlled from chaotic.

So what security projects in our organizations qualify as “best?” I’ll tell you right now it boils down to identity management. Security as a whole is critical for every organization. But at the core of every security functions ist he obligation to protect sensitive assets (be it data, machines, ideas, etc.) from harm. And where does that harm stem from? People! So it makes sense that protecting critical data from people should get considerable attention from a security standpoint. What should get even more consideration is defending those assets from the most dangerous type of threat- people who have unrestricted access to said information.

Identity management is the key to having the “best” in enterprise security. This probably sounds familiar- it’s something we’ve maintained since we started in the business over 25 years ago. According to Gartner, however, business are STILL not managing the identities of their employees very well. In fact just yesterday, Gartner Analyst Bob Blakely spoke to the Gartner Identity and Access Management Summit in London about how critical the management of identity is. According to this article, he specifically emphasized that, “cleaning up Active Directory to manage identity based on attributes rather than hierarchy should be a priority for 2012.”

So how can you improve the way you manage the priviles of your employees and third party contractors? It comes down to this: implement a least privilege solution in your organization. Without such a thing, it’s impossible for you to achieve “best” when it comes to the security of your company. Click here for more information on how to take the next steps in securing your IT environment.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,