Author Archive

General Information
User Name Clango
Fullname Clango
Member Since August 16, 2018

Privileged Account Risk Begins at the Workstation Level

Local Admin Risk
At Clango, our CyberArk consultants and engineers are often asked, “What constitutes a privileged account?” Many people who ask that question are surprised by the answer. There’s a common misconception that privileged accounts are only those that enable the highest levels of administrator access — for example, domain controller credentials in a Microsoft environment. However, any admin rights, even...

Fill Skills Gaps by Partnering with CyberArk Experts

CyberArk Engineers
Demand for IT professionals continues to increase, causing the “skills gap” to grow wider than ever. According to the Bureau of Labor Statistics (BLS), by 2020, there will be one million more IT jobs available than qualified applicants to fill them. In a 2017 study by industry association CompTIA, 46 percent of executives said that skills shortcomings had gotten...

How to Facilitate the IT Audit Process with CyberArk

IT Audits
Many IT teams dread the arrival of auditors. Perhaps they lack a basic understanding of the IT audit process, and don’t know what the auditors are looking for. However, IT teams should recognize the importance of having a third party evaluate the organization’s overall security and compliance position, and facilitate the process through the use of tools such as...

Sure, CyberArk Has an Export Tool, but There’s a Better Way

CyberArk Export
It can be surprisingly challenging to simply list all the privileged accounts stored in the CyberArk Enterprise Password Vault. While Password Vault Web Access (PVWA) provides some reports, they do not cover the full range of use cases most organizations need to meet compliance and operational requirements. Depending on the size of your vault implementation and your specific reporting...

Accelerate Privileged Account Management with CyberArk v10

Privileged Account Management (PAM) is critically important to effective cybersecurity. If privileged account credentials are compromised, an attacker could gain virtually unfettered access to IT resources. However, many organizations remain lax in their PAM practices. Default administrator credentials are left unchanged, users share credentials, and users are granted full admin rights when they don’t really need them. Organizations that...

What Is Privileged Session Management and Why Is It Important?

The critical first step in privileged account management (PAM) is to identify, consolidate, and lock down privileged credentials so only authorized users have access to them. However, this is only the first step. To be effective, PAM should include privileged session management as well as credential protection. Privileged session management is a security control involving the monitoring and recording...

Managing Mobile Data Access Key to GDPR Compliance

Recently, one of the strictest data privacy laws ever enacted officially goes into effect. As organizations around the world review how they handle employee and customer information, many are finding that mobile devices present a significant risk for noncompliance. Officially implemented on May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) is designed to standardize data security...

How to Get Started with PAM and CyberArk

PAM CyberArk
Organizations are recognizing the critical importance of effective privileged account management (PAM), but many remain in the early stages of implementing a PAM strategy. According to a 2017 Forrester report, just 17 percent of organizations have a mature approach to identity and access management (IAM). Those at lower IAM maturity levels are behind in their implementation of essential PAM...

Mature Identity Management Processes Equate to Reduced Security Risk

Identity and access management (IAM) is often approached tactically, as a means of giving users access to resources while minimizing IT operational overhead. The threat mitigation and risk management aspects of IAM are not prioritized, leaving gaps in the organization’s security strategy. Cybersecurity spending, which IDC says will reach $81.7 billion this year, remains heavily weighted toward network security...

The Benefits and Potential Pitfalls of IT Self-Service

Organizations are increasing their use of self-service tools to streamline help desk operations. Most IT self-service tools focus on the automation of manual processes related to password resets and other common identity management tasks. Given that approximately 80 percent of all help desk calls are related to password resets, self-service reduces the strain on the help desk and the...