80 per cent of breaches leverage privileged credentials to gain access to the organisation. according to the Forrester Wave: Privileged Identity Management, Q3 2016. In order to secure privileged access in today’s hybrid enterprise, Centrify has made enhancements to its privileged identity management (PIM) solution to stop breaches that abuse privilege. According to the company, the new capabilities minimise the attack surface and control privileged access to the hybrid enterprise, hence enabling organisations to move from static, long-lived privilege assignments to a just-in-time model. As a result, advanced monitoring detects and alerts in real-time on the creation of backdoor accounts that make it easy to bypass a password vault.
“Data breaches are happening at an alarming rate and to stop them Centrify is taking a unique approach to controlling privileged access in the hybrid enterprise that simplifies the implementation of PIM best practices and strengthens an organization’s risk posture,” said Kamel Heus, regional manager – MEA, Centrify.
“By contrast, password vaults alone are not enough, best practices require organisations add and integrate point products to the vault, which leaves gaps in security and increases risk. We’ve closed those gaps with an integrated solution that combines password vaulting with brokering of identities, MFA enforcement and just-enough privilege, all while securing remote access and monitoring all privileged sessions,” he added.
See how Centrify helps to stop a breach here.