Tag: management

Why the IoT Needs IAM, Part 2: The Complexity of Controlling Access

DDOS
In a previous post Why the IoT Needs IAM, Part 1: Rise of the Botnets, we discussed the growth of the Internet of Things (IoT) and the enormous attack surface created by billions of Internet-connected devices. Many of these devices have been recruited into botnet armies that are used to launch distributed denial of service (DDoS) attacks. Others are...

Automation Helps Meet Regulatory Requirements for Privileged Accounts

Automation
Privileged account security has become a focal point of many government and industry regulations. Take, for example, the latest version of the Payment Card Industry Data Security Standard (PCI-DSS), which mandates security practices and controls that must be implemented by organizations that store, process, or transmit payment card data. PCI-DSS 3.2 requires that organizations change vendor-default passwords for privileged...

Why the IoT Needs IAM, Part 1: Rise of the Botnets

Clango
In the Internet of Things (IoT), billions of connected objects quietly collect and transmit data and perform a wide range of functions, generally without human intervention. Imagine vending machines that tell you when they need to be replenished, vehicles that schedule their own maintenance, and “smart home” products that let you lock your doors, control your thermostat, and peek...

Why Does Identity and Access Management / Governance Matter?

IAM
The risks associated with insider-threat theft and data breaches are well known. At the very least we ought to be aware of who is currently able to access our information resources and operational controls. We need to understand the risks to the enterprise if information or access falls into the wrong hands, or is corrupted in some way. Whatever...

How Enterprise Asset Management Helps Enable Digital Transformation

MaxFactory
At the end of every year, IT industry analysts and research firms try to predict which technology trends will have the greatest impact in the coming months. Some of the top picks for 2017 include artificial intelligence and machine learning, augmented and virtual reality, 3-D printing, Blockchain, and wearables. Meanwhile, cloud computing will continue to grow unabated, and billions...

Why IAM Is Often Put on the Back Burner and Why It Shouldn’t Be

Kabir
So, you’ve just been breached. Now what? Many questions come to mind. Is the breach contained? Who was behind it? Were they internal or external? How did they get in? What did they get? Depending on your organization’s level of sophistication in response to such incidents, a number of processes, controls, and workflows will be initiated and checked. Some...

How to Breeze Through a Maximo Upgrade with No Downtime

MaxFactory
In late 2014, IBM released version 7.6 of its Maximo product, with new features designed to increase efficiency and reliability. Maximo 7.6 has a new user interface with a customizable dashboard that displays the most relevant information at a glance. Under the hood are many improvements in functionality and reporting that enhance the value of this enterprise asset management...

Using KPIs to Redefine IAM Success, Part 1

IAM
“The global identity and access management market is expected to swell to $24.55 billion by 2022, according to a new report from Grand View Research, Inc.” – Grandview Research, “Identity And Access Management Market Analysis By Deployment, By End-Use and Segment Forecasts To 2022″ ~ Organizations are prioritizing investments in identity and access management (IAM). In a recent survey...

Why User Identities Are the Weak Link in Enterprise Security

PAS
According to the Identity Management Institute, more than 90 percent of all cyberattacks are successfully executed with credentials obtained from unwitting users. Spear phishing attacks are the most common method used to steal this information. It is easy and inexpensive for cybercriminals to send a fake email with a malicious attachment or link that downloads spyware to the victim’s...

Overcoming the Operational Obstacles to Privileged Account Security

Clango
Privileged account management is one of the most critical components of any enterprise security strategy. Cybercriminals prize privileged account credentials because they provide administrator-level access to servers, security systems, network devices, databases, applications and other resources. If hackers are able to obtain the “keys to the kingdom,” they gain virtually unfettered access to an organization’s systems and data. Best...