BeyondTrust > Case Studies > Managing Passwords & Local Administration Rights: a Two-Step Approach to a Secure Workflow

Managing Passwords & Local Administration Rights: a Two-Step Approach to a Secure Workflow

BeyondTrust Logo
Product
  • BeyondTrust
Tech Stack
  • Privileged Access Management (PAM)
Implementation Scale
  • Enterprise-wide Deployment
Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
Use Cases
  • Cybersecurity
About The Customer
The customer in this case study is an unnamed high-tech company. The company had a significant issue with information security, with a focus on putting out fires rather than preventing them. The company's CISO had a team with clearly defined roles, but their sole focus was on dealing with issues as they arose, rather than looking at the bigger picture. The company needed a solution that would allow them to take a proactive approach to security, reducing the attack surface within their infrastructure and preventing breaches before they happened.
The Challenge
The company was facing a significant challenge in managing password vulnerabilities and local administration rights, which were identified as the two biggest security holes. The company's InfoSec team was constantly putting out fires, dealing with security issues as they arose, but there was no strategic approach to preventing these issues from occurring in the first place. The company needed a solution that would allow them to take a proactive approach to security, reducing the attack surface within their infrastructure and preventing breaches before they happened.
The Solution
The solution to the company's problems was privileged access management (PAM), specifically the BeyondTrust platform. BeyondTrust was chosen after a two-week 'bake-off' comparing it with a competing product. The platform was rolled out gradually, starting with the C-suite and the InfoSec team, then moving on to early-adopter system administrators. BeyondTrust allowed the company to establish a hierarchy of access privileges, with applications being whitelisted, blacklisted, or graylisted as necessary. The platform also allowed the company to monitor the applications and upgrades being installed by employees, and to generate daily reports for review.
Operational Impact
  • The company was able to turn around their InfoSec culture and processes, making their infrastructure much more secure.
  • Employees began taking password management and local access privileges seriously.
  • The restrictions imposed by adopting PAM freed everyone in the company to focus on using IT to improve business practices instead of worrying about potential breaches.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.