ARCON recognized as a Customers’ Choice in the Gartner Peer Insights 'Voice of the Customer' for Privileged Access Management. Read More

x

IDENTIFYING THE RISKS BEFORE TIME

WE BELIEVE IN PROTECTING THE DATA WITH ADVANCED METHODS

RISKS TO WATCH

Why Just-In-Time Privilege Elevation? | Risks To Watch | ARCON
Why Just-In-Time Privilege Elevation?

One disconcerting aspect in privileged access management (PAM) is that organizations are often not completely accustomed to widespread risks. Even if the PAM tools are in place, the fundamental principles sometimes could take a backseat. For instance, noncompliance to the ‘Least Privilege’ principle due to the absence of Just-in-time (JIT) privilege elevation approach. Scenario 1: Enterprise on-prem privileged access management includes robust vaulting and session monitoring, but privileged users have ‘Always-on’ entitlements. No privileged user requires 24*7 privileged access. And arbitrarily accessed privileged accounts amplifies the insider threat. Scenario 2: Enterprise does not want to do all the heavy lifting [...]

Posted On | 09-09-2021
Privileged Accounts, Data Breach

Is your IP Data Secure?

The global pharmaceutical giants are inching closer to find nearly 100% efficacy for covid-19 doses. These vaccines when out in pharmacies will herald a new beginning for the mankind wedged by unprecedented human and financial losses. But as scientists and researchers labor to find that ideal clinical formula, a grave threat is looming in the cyber space— attack on intellectual property (IP) data. A wave of recently executed cyber-attacks threatened to abuse the Intellectual Property of pharma companies working to prepare the treatment for curing covid-19. It’s not hard to fathom how vulnerable our sensitive data assets are in the [...]

Posted On | 27-11-2020
Privileged Accounts, Data Breach

Targeted Attacks on confidential data

A popular European budget airline has recently revealed that it had suffered a “highly sophisticated” cyberattack exposing names, email addresses and travel details of almost 9 million customers. This incident has shaken the world of cybersecurity and has forced the IT security officials to rethink about the robustness of access control management and overall cybersecurity posture. As we see today, many organizations still show a lackadaisical attitude towards securing critical information, critical systems, and privileged credentials. In the above incident, without disclosing the hackers’ identity, the organization claimed that the hackers’ group obtained unauthorized access to their huge database consisting [...]

Posted On | 29-05-2020
Privileged Accounts, Data Breach

Protecting Passwords: The key to securely lock enterprise digital assets

A few months back, Facebook, the social media giant, acquired the headlines of cyber security news due to poor password management. Millions of users’ private credentials were stored in plain text format which was revealed by a reporter in a security blog. Although Facebook has denied the privacy breach of those million users (many of them were even in Instagram) and has assured that any kind of password reset is not required, we can not deny that the risk still prevails. Earlier during the end of 2018, an unknown hacker illegally accessed personal details of 29 million users of Facebook. [...]

Posted On | 02-08-2019
Privileged Accounts, Data Breach

Do you have a security net for Privileged Accounts?

Innovation drives growth, which in turn, requires global enterprises to cultivate IT ecosystems for collating, comprehending, and managing a growing amount of vital information (data) to stay ahead of the competition. That transition, however, multiplies our network of IT resources. As organizations look to gain an edge—critical data, devices, software applications, and systems necessary to conduct routine operations also increase during the course of a time. Our IT ecosystem, subsequently, gets structured in multiple layers of devices and applications—both on premises and cloud, ultimately resulting in a number of administrative accounts or privileged accounts – super-user credentials holding access keys [...]

Posted On | 03-02-2017
Privileged Accounts, Data Breach

Select Category