Research Library

Powered by

Oct 20, 2011
Oct 18, 2010
16 Page(s)
White Paper

See all research from

  • CW+ Quocirca report: Privileged user management

    Sponsored by:

    The level of access to sensitive data given to privileged users is often the highest any employees have had in the history of business. It is the equivalent of having the locksmith solely hold the keys to the safe, and then requiring them to come and maintain it at any time they wish, alone and unassisted. Whilst such access is necessary, it is most commonly managed on an ad hoc basis or not managed at all and, despite claims to pay heed to regulations, requirements with regard to privileged users are often overlooked.

    This report should be of interest to anyone concerned with ensuring that the availability of their IT systems is not impacted by the inadvertent or malicious actions of privileged users, that the use of privileged user accounts is policed and that such accounts cannot be easily compromised by outsiders. It should also be of interest to those with responsibility for ensuring that their organisations’ use of IT would satisfy the demands of regulators and, indeed, anyone concerned about the safe keeping of their personal data that businesses are storing ever more of.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.