1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Review: Stop insider attacks with these 6 powerful tools

Discussion in 'Network World' started by RSS, Nov 9, 2015.

  1. RSS

    RSS New Member Member

    Privileged Identity Management is based on the idea that a common element of most advanced threats involves obtaining the credentials of an administrator, super-user or even a program with local admin rights. Armed with those credentials, the attacker can turn internal systems against themselves, rewrite security policies and remain undetected.

    Privileged Identity Management tools lock down those special user credentials so that even successful breaches are only done against low-level endpoints that can’t do much harm. Should attackers on a compromised system attempt to elevate those privileges, not only will they be quickly detected, but any process that attempts to run will be blocked.

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...

Share This Page