Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Securing privileged identity white paper

Lieberman Software : 17 September, 2009  (Technical Article)
Automated and manual methods of controlling privileged access are highlighted in four key steps in a white paper on securing privileged access released by Lieberman Software
To help organizations secure privileged access to sensitive business data, Lieberman Software is offering a complimentary white paper titled, "Who Holds the Keys to Your IT Kingdom? Four Key Steps to Securing Privileged Identities." This white paper provides practical tips, including manual processes as well as automated alternatives, for securing and managing the privileged account credentials that grant access to IT resources.

Frequent news reports of companies suffering costly data breaches, operational disruptions, and regulatory compliance violations prove the risk of ineffective privileged identity management. Why do these failures continue to occur? What exactly are privileged identities? Where do they exist and how does access to these accounts spread? "Who Holds the Keys to Your IT Kingdom? Four Key Steps to Securing Privileged Identities" answers these questions and describes how to secure privileged identities using the four part I.D.E.A. concept.

Developed by Lieberman Software, the I.D.E.A. process includes:

Identify and document all critical IT assets, their privileged accounts and their interdependencies.

* Delegate access to credentials so that only appropriate personnel, using the least privilege required, can login to IT assets.
* Enforce rules for password complexity, diversity and change frequency, and synchronize changes across all dependencies.
* Audit and alert so that the requester, purpose, and duration of each privileged access request is documented.

By following these four key steps, organizations in all vertical industries can reduce the threat of costly data breaches, improve operational efficiency, and comply with major regulatory mandates like PCI DSS, Sarbanes-Oxley, and HIPAA.

"Who Holds the Keys to Your IT Kingdom? Four Key Steps to Securing Privileged Identities" is available as a free PDF download to IT professionals and security auditors by downloading from the Lieberman web site.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo