Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > NETIQ > Privileged Users: Managing Hidden Risk in Your Organization
 

Privileged Users: Managing Hidden Risk in Your Organization

White Paper Published By: NETIQ
NETIQ
Published:  Sep 09, 2013
Type:  White Paper
Length:  2 pages

While insider breaches have happened for years, many organizations find themselves asking a serious question: Are we at risk? The answer comes down to a group known as “privileged users” within your organization. Every company has them, but who are they? How much exposure do they bring? And, most importantly, how can you control them?

Nearly 70% of 47,000 security incidents examined by Verizon were caused by “internal actors,” the majority of which were the result of errors on the part of a privileged user or misuse of access. This free flash point paper explains a few simple rules that can reduce your privileged user risk, as well as the things you should consider when implementing a solution to help you control these privileged users.



Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum, security