Tag: CLANGO

Privileged Account Management Is Critical in the Cloud

Cloud Security
The move to the cloud began in earnest in 2007, as organizations looked for ways to cut capital expenses during the Great Recession. Fast-forward a decade, and the cloud is more popular than ever. According to a recent survey by LogicMonitor, 68 percent of workloads are running in public, private, or hybrid clouds, and that number will increase to...

Application Greylisting Provides Greater Security and Flexibility

Application Greylisting
Misplaced trust is a dangerous thing when it comes to cybersecurity. Attackers routinely take advantage of systems that automatically permit certain types of activity. Therein lies the problem with application whitelisting, which is the practice of designating specific applications that users are allowed to run on their systems. It’s the opposite of blacklisting, which blocks applications that are known...

Clango Innovation Labs: Maximizing the Value of CyberArk

CIL
Given the large and growing volume of privileged account credentials in the typical IT environment, most organizations recognize the need for automated privileged account management (PAM) solutions. PAM platforms provide one central location for storing, protecting, and managing privileged credentials so only authorized users can access them for legitimate business or IT reasons. However, PAM solutions have a reputation...

How to Minimize the Risk of Local Admin Rights and Privileged Account Attacks

EPM
In our last post, we discussed the risks of granting administrator rights to end users at the workstation level. Local admin rights enable users — or hackers — to do whatever they want with a machine. An attacker who is able to obtain local admin credentials can launch a “pass-the-hash” attack, leveraging well-known Windows vulnerabilities to obtain higher-level privileged...

Fill Skills Gaps by Partnering with CyberArk Experts

CyberArk Engineers
Demand for IT professionals continues to increase, causing the “skills gap” to grow wider than ever. According to the Bureau of Labor Statistics (BLS), by 2020, there will be one million more IT jobs available than qualified applicants to fill them. In a 2017 study by industry association CompTIA, 46 percent of executives said that skills shortcomings had gotten...

Identity Management Becoming Key to Mobile Security

Clango
Workers today spend more than a third of their time away from their desks, leveraging a mix of mobile devices and applications to access and share information and collaborate with others. While mobile devices give us unprecedented connectivity options, they also create significant security challenges. In a survey of 4,500 business users, the research firm Ovum found that 70...

The Most Common Cybersecurity Threats Impacting Organizations Today

Cybersecurity
Organizations face an increasing number of cybersecurity threats, taxing the ability of IT teams to protect their systems and networks. An understanding of the most common threats and sources of compromise enables them to focus their efforts and increase the odds of preventing a security breach. To that end, the SANS Institute conducted a survey of more than 250...

Why Identity Management Is Critical in Mergers and Acquisitions

IAM Mergers
Mergers and acquisitions are all about finding synergies that increase efficiency and shareholder value. However, M&A deals are inherently risky, requiring careful examination of a target company’s assets, liabilities, and vulnerabilities. Generally, the focus is on financials, but cybersecurity is playing an increasingly important role. EY recently released the 16th edition of its Global Capital Confidence Barometer, with data...

Enabling Identity Management for Microservices and Cloud-Native Apps

Clango
Cloud access security brokers (CASBs) enable organizations to extend their internal security policies to cloud-based applications and services. A CASB serves as a sort of gatekeeper, sitting between an organization’s onsite infrastructure and the cloud. It can be deployed as an on-premises software tool or a cloud-based service, and may use proxies or APIs to monitor traffic and enforce...

Authentication-as-a-Service Simplifies Single Sign-on and Access Controls

Cloud
The cloud delivers many business benefits, including the ability to preserve capital, offload many IT operational tasks, implement new applications and services quickly, and tap into IT resources that might not otherwise be affordable. Thanks to these benefits, organizations are moving to the cloud in a big way. According to the RightScale 2017 State of the Cloud Report, the...