Layer 7 Privileged Access Management

Privileged Access Management: It’s for Applications too 

07-22-2016 03:54 PM

As businesses look to provide effective defenses from malicious attackers and rogue insiders, and to comply with newer audit and compliance mandates, Privileged Access Management has become an important counter-measure that is being adopted. One common approach is to provide a credential vault, which securely stores privileged passwords and SSH keys, and provides a secure way of supplying those credentials to authorized users.

 

Yet hiding beneath surface are applications and scripts that also use privileged credentials. Many of those applications and scripts use "hard-coded" credentials, which represent an unseen vulnerability that is waiting to be exploited.

Statistics
0 Favorited
1 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.