Research finds major challenges monitoring and managing privileged user access and activities, with 70 percent of respondents indicating users likely to access sensitive or confidential data without a business need.
In an ever-accelerating trend, estimates are that 90 percent of the wireless locks sold are integrated with other smart devices. No longer will you struggle to manage a variety of insecure and vulnerable physical credentials when you can manage all of that through a mobile app. As this market expands into non-traditional access control applications, the necessity for an access control credential on an ubiquitous mobile device becomes mandatory. In the very near future, everyone will carry a credential, and a mobile credential housed on a smartphone is the only viable way to address these needs.
Airlines rely on baggage tugs to quickly transport luggage from planes to baggage reclaim areas for customers. However, airlines often find they have to deal with operational issues such as ground support employees believing all vehicles are assigned to employees when there are many unassigned, decreasing employee productivity.
A new survey by Centrify shows that most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost three out of every four breaches.
While places of worship have certainly been sites of active assailant incidents, they pose a unique conundrum to security advocates and congregations – how do you secure your place of worship while maintaining a welcoming atmosphere for congregants, visitors and those in need?
This Privilege Identity Management solution from AlertEnterprise is designed to ensure that privileged (elevated) access is not misused by system administrators – either intentionally or unintentionally.
ON DEMAND: With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of their “Top Security Projects” list for 2 years in a row). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?
Our special feature this month highlights the Department of Homeland Security's newest agency: the Cybersecurity and Infrastructure Security Agency. Also, this month we highlight the Leander Independent School District's data practices that protect student privacy. Security experts discuss video monitoring, cybersecurity for public-private partnerships, privacy and more.