Intelligent CIO Middle East Issue 46 | Page 27

INFOGRAPHIC associated with the Internet of Things (IoT) posed a big concern for the professionals surveyed, with the visibility of logins from IoT devices revealed as the most pressing issue. In fact, 90% of those with fully integrated PAM tools are confident they can identify specific threats from employees with privileged access. Three quarters (76%) are confident they know how many IoT devices are accessing their systems, while four in five are confident they know how many individual logins can be attributed to these devices. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies. “As the vendor ecosystem grows, the threat landscape evolves and users should be granted specific role-based privileges. The report did show that some organisations are managing these risks with a privileged access management (PAM) solution. From the research, these same organisations experience less severe security breaches and have better visibility and control than those who use manual solutions or no solution at all. www.intelligentcio.com “Organisations need to accept that the way to mitigate risks is by managing privileged accounts through integrated technology and automated processes that not only save time, but also provide visibility across the environment,” Haber added. “By implementing cybersecurity policies and solutions that also speed business efficiency, versus putting roadblocks in users’ way, organisations can begin to seriously tackle the privileged access problem.” n “ THERE HAS NEVER BEEN A GREATER NEED TO IMPLEMENT ORGANISATION- WIDE STRATEGIES AND SOLUTIONS TO MANAGE AND CONTROL PRIVILEGED ACCESS IN A WAY THAT FITS THE NEEDS OF THE USER. INTELLIGENTCIO 27