The Common Credentials Dilemma – how to get a grip on password sprawl for privileged accounts
- LANGUAGE: English DATE: Friday, May 10, 2013 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as administrator, dba, or root – not to speak of all the admin accounts of network equipment etc. Unfortunately, a large portion of accounts with highly elevated privileges is shared. To manage these accounts, to avoid password sprawl, and to in consequence mitigate risks, both guidelines and technologies are required.
In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst, will first of all look at what accounts to look at. He then will focus on Golden Rules for Privilege Management and on the recommended approach for the organizational framework, including policies.
In the second part, Phil Lieberman, Founder, President & CEO of Lieberman Software, will dive into detail and look at this challenge. He then will show how to technically address these challenges for various types of accounts, beyond root.
This webinar will deliver deep insight into the need and both proven and recommended approaches for tackling the Common Credentials Dilemma.
Lieberman Software Corporation is a technology leader in privileged identity management (PIM) and Windows security management. We have more than 20 years of product innovation and more than 1,200 enterprise customers worldwide. We developed the first solution for the privileged account management space, and our products continue to lead the market in features and functionality. Our PIM products prevent unauthorized users and programs from gaining anonymous access to the powerful privileged accounts that provide unrestricted access to IT assets and sensitive data throughout the enterprise. Our Windows security management tools manage and report on the groups, users, passwords, registries, objects, permissions, shares, and services dispersed throughout the network.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.