Content of Figures
- Figure 1 The changing risk perceptions and the factual increase in risk as well as ever-tightening regulations lead to an increase in users being considered as privileged users.
- Figure 2 Privilege Management is expanding beyond the traditional scope of technical and administrative users, towards a broader range of users with elevated privileges, also from business.
- Figure 3 The Privilege Management Cycle.
- Figure 4 Elements of a modern Privilege Management.
The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-con ...Login Get full Access
- The changing requirements of SOCs: New types of attacks and the increase in numbers require new approaches for countering attacks
- Regulatory compl ...
3 SOCs, Risks, and Compliance
Ever-increasing cyber-risks and the growing number of ever-tightening regulations and audits change the requirements for SOCs and Privilege Management ...Login Get full Access
3.1 The changing Risk Landscape
Over the past years, external attacks increased massively. On the other hand, internal attacks remain at a high level, with many of the internal attac ...Login Get full Access
3.2 The ever-tightening Regulations
While the risks grow, organizations are on the other hand facing ever-tightening requirements for regulatory compliance. Over the past years, the numb ...Login Get full Access
3.3 The changing Role of SOCs
A central element in fighting the ever-increasing cyber-attacks are SOCs – if organizations have these. In many cases, the IT security department ta ...Login Get full Access
3.4 Who are today’s Privileged Users?
The third area of change are the users to deal with. Traditionally, the focus has been on a restricted number of internal, highly privileged users suc ...
The change in both risk perception and factual risks and the growing number of ever-tightening regulations and audits lead to an increase in the numbe ...Login Get full Access
4 Privilege Management: Beyond Shared Account Passwords
Privilege Management is changing. While protecting passwords of shared accounts has been the main discipline in past times, analytics and monitoring a ...Login Get full Access
4.1 The new scope of Privilege Management
This new scope and role of Privilege Management becomes obvious when looking at the variety of use cases organizations are facing today. Figure 1 illu ...
On the other hand, the perception of what a privileged account is has changed. It is no longer only or primarily the shared account, but every account ...Login Get full Access
4.2 The Privilege Management Cycle
In consequence, Privilege Management becomes more complex. When implementing or expanding a Privilege Management approach, organizations must focus on ...
Major questions organizations should raise for themselves are:
- Do we know about all our privileged accounts?
- Do we protect all privileged accoun ...
4.3 SOCs and Logs
When looking at the Privilege Management Cycle, there are three phases that require attention, but also new technologies – even more, when looking a ...Login Get full Access
4.4 Modern Privilege Management
Modern Privilege Management thus is broader than it has been considered previously. Shared Account Password Management and the related capabilities re ...
Session Management is what enables controlling not only access to certain accounts and sessions, but monitoring, recording, and restricting what happe ...Login Get full Access
5 The Balabit Approach on mitigating Risk and achieving Compliance
Balabit provides a platform that support customers in addressing the emerging requirements of modern SOCs and Privilege Management. The three solution ...Login Get full Access
5.1 Balabit syslog-ng
Balabit syslog-ng is offered in three different editions. All of these editions add a number of capabilities to the standard syslogd. The entry level ...Login Get full Access
5.2 Balabit Shell Control Box
Shell Control Box is a standalone appliance that controls, monitors and audits remote administrative access to servers and network devices. It is deli ...Login Get full Access
5.3 Balabit Blindspotter
Blindspotter is the latest addition to the company’s portfolio, released in 2015 as a solution for real-time user behavior analysis to help identify ...Login Get full Access
KuppingerCole recommends organizations reviewing their Privilege Management approach and taking a broader view on this essential element of their IT S ...Login Get full Access