Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical SecurityAccess ManagementCybersecurity News

Managing Privileged Access is Crucial to Preventing Data Breaches

By Nathan Wenzler
privileged-access-900
June 28, 2016

Organizations across America are facing unprecedented challenges in building effective, manageable security programs in order to protect the wide array of sensitive data they are responsible for keeping safe. Corporations, educational institutions and government agencies are often beholden to many different regulations and legal compliance requirements because of the various datasets they maintain. For example, a university will have a student health center that stores Personally Identifiable Information (PII) and other health information covered under the Health Insurance Portability and Accountability Act (HIPAA).  Additionally, that same university’s bookstore, food services and other student services will store credit card transaction data, which are mandated by the Payment Card Industry (PCI) to be protected. Government agencies, such as the recently breached Office of Personnel Management, store employee records and related PII that may be further regulated, depending on the state or federal district in which the agency is based.

These various needs can be difficult for organizations to balance and maintain, but regardless of the type of organization, critical and sensitive data must be protected and kept safe from hackers, malicious insiders, malware and other forms of cyber-attack. Add in the normal budgetary and human resource challenges that all organizations face, and you’ve got what can seem like an insurmountable security problem.

Fortunately, as defense-in-depth strategies are shifting to a more data-centric model, it is becoming easier for information security teams to get their arms around these problems by simply focusing on fundamental and common points of access in order to build security controls. In this regard, credentials are truly the key to everything. How does a user gain access to data? They input their user name and password. Need to back up an entire database? Use a database administrator’s credentials.  Nearly every data breach and cyber-attack seen today is ultimately targeting credentials. 

Credentials have the permissions and rights to access as much data as possible. For this very reason privileged accounts, such as local administrator accounts, domain administrators, root accounts and more, are often referred to as the “keys to the kingdom.” Not only do they have access to data, systems and applications, but security tools are often built to permit these privileged accounts to move freely about any system on the network. If organizations can control and manage these privileged accounts, then a fundamental layer of protection is put into place to address all of the challenges presented by regulatory and legal requirements, even intellectual property theft from cybercriminals and malicious insiders.

This is where Privileged Account Management (PAM) comes in. PAM has been a standard security tool for many years, but only recently it has moved into the spotlight as a fundamental part of a defense-in-depth program within private corporations, government agencies, and all other types of organizations. As more attacks and data breaches are found to be caused by abuse of privileged credentials, organizations have come to realize that protecting those credentials needs to be a first priority, and not an afterthought to other security layers.

Best of all, modern enterprise-grade Privileged Account Management tools are designed to be easy-to-use, simple to deploy and very cost effective. They can be scaled out to address the many different teams that may be involved across business units, and easily customized to protect different credentials and datasets in whatever ways are required. Many organizations that have implemented these sorts of tools have done so specifically for these reasons, underscoring that creating huge security benefits and building a stronger overall security posture doesn’t have to be expensive, difficult to deploy and implement, or painful for IT administrators to use on a day-to-day basis.

One case in point: the University of Central Florida (UCF) has deployed a PAM tool to securely manage privileged account passwords, restricting access to the sensitive data of its 60,000 students, as well as faculty, alumni and donors. "Privileged account management is one of our top priorities because of the types of data these accounts can access," says Matthew Fitzgerald, senior security analyst at UCF. "We knew we needed to invest in an enterprise-class solution that we could quickly deploy in order to protect these sensitive data sets.”    

KEYWORDS: data breach security credentials

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nathan Wenzler is Executive Director of Security at Thycotic, a provider of IT security and password management solutions. Wenzler has almost two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. Wenzler has helped government agencies and Fortune 1000 companies build new information security programs from scratch, as well as improve and broaden existing programs with a focus on process, workflow, risk management, and the personnel side of a successful security effort. As the Executive Director of Security for Thycotic, Wenzler brings his expertise on security program development and implementation in both the public and private sector to admins, auditors, managers, and security professionals at a variety of conferences, trade shows, and educational events.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • appSec

    Why application-layer security is critical in preventing data breaches

    See More
  • Employee Training is Key in Preventing Breaches, But is it Enough?

    See More
  • Data Breach

    Data breaches: Preventing and responding

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • May 21, 2026

    From Referral to Response: Managing Domestic Violence Threats in the Workplace

    Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing