over privileged

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: Dell Software     Published Date: Jul 18, 2012
Avoid over-privileged user accounts
Tags : 
management, technology, user privileges, customers, experience, help desk, windows, privilege
    
Dell Software
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
Ponemon Institute presents the findings of The Insecurity of Privileged Users - outlines the current threats to an organization's sensitive and confidential data created by a lack of control and oversight of privileged users in the workplace.
Tags : 
    
Quinstreet - Infosec
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Search Resource Library