Are password vaults enough to stop data breaches?

Centrify improves identity management through a just-in-time model
Kamel Heus, Regional Manager, Centrify
Kamel Heus, Regional Manager, Centrify


80 per cent of breaches leverage privileged credentials to gain access to the organisation. according to the  Forrester Wave: Privileged Identity Management, Q3 2016.  In order to secure privileged access in today’s hybrid enterprise, Centrify has made enhancements to its privileged identity management (PIM) solution to stop breaches that abuse privilege. According to the company, the new capabilities minimise the attack surface and control privileged access to the hybrid enterprise, hence enabling organisations to move from static, long-lived privilege assignments to a just-in-time model. As a result, advanced monitoring detects and alerts in real-time on the creation of backdoor accounts that make it easy to bypass a password vault. 

“Data breaches are happening at an alarming rate and to stop them Centrify is taking a unique approach to controlling privileged access in the hybrid enterprise that simplifies the implementation of PIM best practices and strengthens an organization’s risk posture,” said Kamel Heus, regional manager – MEA, Centrify.

“By contrast, password vaults alone are not enough, best practices require organisations add and integrate point products to the vault, which leaves gaps in security and increases risk. We’ve closed those gaps with an integrated solution that combines password vaulting with brokering of identities, MFA enforcement and just-enough privilege, all while securing remote access and monitoring all privileged sessions,” he added.

See how Centrify helps to stop a breach here


REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.

Editor's Choice

Emerson expands analytics platform for industrial enterprise-level wireless infrastructure management
Plantweb Insight platform adds two new Pervasive Sensing applications that manage wireless networks more efficiently with a singular interface to the enterprise
Digitalisation seen as a competitive advantage by Middle East private businesses
Nearly 80 per cent of private business leaders acknowledge that digitalisation can impact business sustainability
Etisalat introduces Multi-Access Edge Computing architecture delivering best-in-class video streaming performance for 5G networks
MEC architecture achieves performance gains of as much as 90% in video streaming, validating how ultra-low-latency applications will be delivered over 4G and 5G networks

Most popular

Don't Miss a Story