Blog

What Is Privileged Session Management and Why Is It Important?

PSM
The critical first step in privileged account management (PAM) is to identify, consolidate, and lock down privileged credentials so only authorized users have access to them. However, this is only the first step. To be effective, PAM should include privileged session management as well as credential protection. Privileged session management is a security control involving the monitoring and recording...

Managing Mobile Data Access Key to GDPR Compliance

Clango
Recently, one of the strictest data privacy laws ever enacted officially goes into effect. As organizations around the world review how they handle employee and customer information, many are finding that mobile devices present a significant risk for noncompliance. Officially implemented on May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) is designed to standardize data security...

How to Get Started with PAM and CyberArk

PAM CyberArk
Organizations are recognizing the critical importance of effective privileged account management (PAM), but many remain in the early stages of implementing a PAM strategy. According to a 2017 Forrester report, just 17 percent of organizations have a mature approach to identity and access management (IAM). Those at lower IAM maturity levels are behind in their implementation of essential PAM...

Mature Identity Management Processes Equate to Reduced Security Risk

Clango
Identity and access management (IAM) is often approached tactically, as a means of giving users access to resources while minimizing IT operational overhead. The threat mitigation and risk management aspects of IAM are not prioritized, leaving gaps in the organization’s security strategy. Cybersecurity spending, which IDC says will reach $81.7 billion this year, remains heavily weighted toward network security...

The Benefits and Potential Pitfalls of IT Self-Service

Clango
Organizations are increasing their use of self-service tools to streamline help desk operations. Most IT self-service tools focus on the automation of manual processes related to password resets and other common identity management tasks. Given that approximately 80 percent of all help desk calls are related to password resets, self-service reduces the strain on the help desk and the...

The Link Between EAM, IoT and Digital Transformation

Clango
While data volumes have been increasing rapidly for many years, the Internet of Things (IoT) is accelerating that process. Billions of Internet-connected devices are collecting and generating data that can be used to optimize operations and create new business opportunities. That’s why the IoT is considered a key driver of digital transformation. The problem is that many organizations aren’t...

Why EAM and ERP Should Work Hand in Hand

Clango
For many years, a debate has raged regarding the relative merits of enterprise resource planning (ERP) and enterprise asset management (EAM) systems. Typically, this debate pits an organization’s finance department against its operational teams, with IT stuck somewhere in the middle. Finance might argue that ERP is critical to the business, and ERP modules can provide some EAM functions;...

OAuth Is Convenient, But Is It Secure?

Clango
Earlier this year, a phishing attack targeting Google Docs abused OAuth to give hackers full access to victims’ Gmail accounts and contacts. Google blocked the attack within about an hour, but it might have affected as many as a million Gmail users. Here’s how it worked. The attackers got access to Google’s OAuth APIs by posing as legitimate third-party...

Federated Identity Management: More than Single Sign-On

Clango
In a previous post, we discussed how lax password management is putting organizations at risk. A recent Ovum study found that most organizations rely on employee education and self-monitoring to ensure the use of strong passwords. Few organizations have automated tools for password management, creating a burden on employees and help desk personnel. Identity and access management (IAM) technology...

Identity Management Becoming Key to Mobile Security

Clango
Workers today spend more than a third of their time away from their desks, leveraging a mix of mobile devices and applications to access and share information and collaborate with others. While mobile devices give us unprecedented connectivity options, they also create significant security challenges. In a survey of 4,500 business users, the research firm Ovum found that 70...