Executive View: CyberArk Privileged Threat Analytics - 70859
Report Details

In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT departments. However, the ongoing trends in the IT industry have gradually shifted the focus of information security from perimeter protection towards defense against insider threats. Just as company networks become more open, incorporating multiple interconnected locations, the very notion of network perimeter is gradually disappearing. Traditional perimeter security systems such as firewalls are no longer effective against targeted attacks, and privileged accounts are the primary targets for attackers. Stolen administrator credentials have been the cause of many recent high-profile security breaches (including the famed Edward Snowden case). Compromised technical accounts for network devices enable attackers to conduct cyber espionage undetected for months. A compromised Programmable Logic Controller (PLC) device could lead to sabotage of an industrial process or even to an industrial disaster...
Date | Title | Price | |
---|---|---|---|
Aug 18, 2014 |
Executive View: CyberArk Privileged Threat Analytics - 70859In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT… |
€190.00
excl. VAT
|
Get Access
![]() |
![]() ![]() ![]() ![]() |
Latest Related Reports
Stay Connected
Latest Research
Trending Videos
How can we help you