BeyondTrust > 实例探究 > Embracing Technical & Business Leadership to Bolster Enterprise-Wide Security

Embracing Technical & Business Leadership to Bolster Enterprise-Wide Security

BeyondTrust Logo
公司规模
1,000+
地区
  • America
国家
  • United States
产品
  • Privileged Access Management (PAM)
  • Symark’s PowerBroker
  • BeyondTrust’s Endpoint Privilege Management
  • BeyondTrust’s Active Directory Bridge
技术栈
  • UNIX
  • Linux
  • Windows
  • OSX
  • AWS
  • Google Cloud
实施规模
  • Enterprise-wide Deployment
影响指标
  • Cost Savings
  • Digital Expertise
  • Productivity Improvements
技术
  • 网络安全和隐私 - 云安全
  • 网络安全和隐私 - 网络安全
  • 网络安全和隐私 - 安全合规
适用行业
  • 金融与保险
适用功能
  • 离散制造
  • 维护
用例
  • 网络安全
  • 基础设施检查
  • 监管合规监控
服务
  • 云规划/设计/实施服务
  • 网络安全服务
  • 系统集成
关于客户
The customer in this case study is a Fortune 100 financial services company. This major player has over 90,000 people, including employees and contractors. The company's infrastructure includes more than 50,000 servers and over 80,000 end-user workstations. In 2007, an audit revealed that the company was not adequately logging privileged activities on their critical systems, which led them to start looking at various solutions on the market. The company decided to acquire Symark’s PowerBroker as a solution and in 2008, the author of the article accepted an employee position in the company’s IT security group.
挑战
The article discusses the challenges faced by organizations in securing their infrastructure from cyber threats. These threats can come from various sources, including criminals infecting networks with ransomware, hacktivists making political statements, careless mistakes by insiders, or ethical hackers compromising poorly defended infrastructure. Many companies take a lax approach to cybersecurity, either thinking they will never be breached or worrying that it's too expensive and will slow down their operations. Resistance to change associated with additional security controls and monitoring is common. Another hurdle is integration, with organizations often dealing with third-party apps, in-house customizations and software, on-site operating systems like UNIX, Linux, Windows, and OSX, and off-prem cloud-based apps that run on AWS and Google Cloud.
解决方案
The solution proposed in the article is Privileged Access Management (PAM), a flattened approach to cybersecurity that simplifies and centralizes the way permissions are granted to IT assets. The author argues that PAM can protect organizations from 90% of cyber threats. The Fortune 100 financial services company adopted this approach to cybersecurity. They acquired Symark’s PowerBroker and later BeyondTrust’s Endpoint Privilege Management, which integrates with Active Directory to create a single touchpoint for managing privilege and access permissions. This approach reduces complexity and eliminates many redundancies, thus lowering costs and streamlining the user experience. The company also leveraged BeyondTrust’s Active Directory Bridge, which allowed them to integrate their UNIX/Linux PowerBroker policy with their directory and Identity and Access Governance platforms.
运营影响
  • The adoption of PAM eliminated probably 90% of the company's security risks.
  • The use of BeyondTrust’s Endpoint Privilege Management reduced complexity and eliminated many redundancies, thus lowering costs and streamlining the user experience.
  • The integration of BeyondTrust’s Active Directory Bridge with the company's UNIX/Linux PowerBroker policy enhanced innovation and reduced the delivery time of new security enhancements.
数量效益
  • The company achieved full enterprise coverage in about eight years.
  • The ratio of servers to admins in the company is something like 30,000:1, demonstrating the scalability of the solution.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

相关案例.

联系我们

欢迎与我们交流!
* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

感谢您的信息!
我们会很快与你取得联系。