<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Security analysts say bad password and user management puts businesses at risk of an insider attack


[fa icon="calendar"] Apr 14, 2015 12:12:36 PM / by WALLIX

What do you think poses the biggest insider risk in your business? There’s no doubt that the Snowden case has highlighted the danger posed, particularly by those users with elevated privileges and access to sensitive and valuable data.

Analyst firm KuppingerCole, who specialise in identity and access management say that, “In practice there is rarely a user life-cycle management for privileged users in place and the danger of password leaks when internal admins leave the organisation or the contract period of an external admin comes to an end has to be considered high.”


So organisations are being challenged to do a better job of minimizing the risk posed by user access, but recent comments by Gartner research director Felix Gaehtgens has questioned the approach many businesses are taking to Identity and Access management, “History is full of failed IAM projects. We believe the key to success is to simplify the approach.”

Gaehtgens believes that many of these kinds of projects bite off more than they can chew and often end up achieving very little in an attempt to solve too many problems at the same time.

“Rather, organisations should prioritise by identifying the low-hanging fruit and address all the things that should be done before implementation and will make their IAM project more manageable,” said Gaehtgens.

Managing, controlling and monitoring privileged users is not only classed as “low-hanging fruit” but also addresses some of the key challenges around identity and access management.


Find out more in a FREE KuppingerCole report which highlights the requirements of a solution to manage and monitor privileged users, as well as an assessment of the features in Wallix AdminBastion.

Topics: Mitigating External Attacks


Written by WALLIX