Turning the Spotlight on IT’s Dirty Little Secret

Securing the Common Point of Failure in IT Risk Controls

Bereitgestellt von: CyberArk Software (DACH) GmbH / Cyber-Ark Software Ltd.

The rise of identity and access management has revolutionized how the enterprise defines a key domain of IT risk control.

IT risk control has focused on areas such as network perimeter security, identity and access management for the general user population. At present, the concept of IT risk management embraces a much wider scope of issues.

In this paper, Enterprise Management Associates (EMA) examines the paradox of IT’s dirty little secret: the poor state of high-privilege access management that represents a common point of failure in IT governance, risk and compliance controls. This potential security and audit failure point threatens organizations worldwide and stands in stark contrast to enterprise maturity in other aspects of IT control. As regulators and malicious parties alike expose this most sensitive IT business risk, executives will gain a new appreciation for the values of what Cyber-Ark defines as Privileged Identity Management (PIM). Cyber-Ark’s Enterprise Password Vault (EPV) gives the enterprise more effective control over a broad range of comprehensive IT governance, risk and compliance priorities, and elevated confidence in the management of privileged access to an organization’s most sensitive information.

Dieser Download wird Ihnen von Dritten (z.B. vom Hersteller) oder von unserer Redaktion kostenlos zur Verfügung gestellt. Bei Problemen mit dem Öffnen des Whitepapers deaktivieren Sie bitte den Popup-Blocker für diese Website. Sollten Sie weitere Hilfe benötigen, wenden Sie sich bitte an hilfe@vogel.de.
Publiziert: 12.05.09 | CyberArk Software (DACH) GmbH / Cyber-Ark Software Ltd.

Anbieter des Whitepaper

CyberArk Software (DACH) GmbH

Kennedydamm 24
40476 Düsseldorf
Deutschland