INFOGRAPHIC
associated with the Internet of Things (IoT)
posed a big concern for the professionals
surveyed, with the visibility of logins from IoT
devices revealed as the most pressing issue. In fact, 90% of those with fully integrated
PAM tools are confident they can identify
specific threats from employees with
privileged access.
Three quarters (76%) are confident they
know how many IoT devices are accessing
their systems, while four in five are confident
they know how many individual logins can
be attributed to these devices. At the same
time, 57% of security decision makers
perceive at least a moderate risk from Bring
Your Own Device (BYOD) policies. “As the vendor ecosystem grows, the threat
landscape evolves and users should be
granted specific role-based privileges.
The report did show that some organisations
are managing these risks with a privileged
access management (PAM) solution. From
the research, these same organisations
experience less severe security breaches and
have better visibility and control than those
who use manual solutions or no solution at all.
www.intelligentcio.com
“Organisations need to accept that the way
to mitigate risks is by managing privileged
accounts through integrated technology
and automated processes that not only save
time, but also provide visibility across the
environment,” Haber added.
“By implementing cybersecurity policies and
solutions that also speed business efficiency,
versus putting roadblocks in users’ way,
organisations can begin to seriously tackle
the privileged access problem.” n
“
THERE HAS
NEVER BEEN A
GREATER NEED
TO IMPLEMENT
ORGANISATION-
WIDE STRATEGIES
AND SOLUTIONS
TO MANAGE
AND CONTROL
PRIVILEGED
ACCESS IN A
WAY THAT FITS
THE NEEDS OF
THE USER.
INTELLIGENTCIO
27