A basic tenet of security is to apply the strongest safeguards to the highest value targets. Systems and IT administrators comprise a set of privileged users granted access to very high value targets. Their access rights include, to name a few, the ability to create new virtual machines, change operating system configurations, modify applications and databases, install new devices - and most of all, direct access to organization’s protected data (let it be financial or health, for example). If misused, the privileges they are granted can have devastating consequences.
This white paper focuses on how organizations facing these issues of privileged access can effectively balance the challenges of cost, risk and compliance. It describes how privileged access governance can be made minimally invasive, scale to enterprise requirements, and most importantly, prevent costly losses and potential audit exceptions.