BeyondTrust > 实例探究 > Managing Passwords & Local Administration Rights: a Two-Step Approach to a Secure Workflow

Managing Passwords & Local Administration Rights: a Two-Step Approach to a Secure Workflow

BeyondTrust Logo
产品
  • BeyondTrust
技术栈
  • Privileged Access Management (PAM)
实施规模
  • Enterprise-wide Deployment
技术
  • 网络安全和隐私 - 身份认证管理
用例
  • 网络安全
关于客户
The customer in this case study is an unnamed high-tech company. The company had a significant issue with information security, with a focus on putting out fires rather than preventing them. The company's CISO had a team with clearly defined roles, but their sole focus was on dealing with issues as they arose, rather than looking at the bigger picture. The company needed a solution that would allow them to take a proactive approach to security, reducing the attack surface within their infrastructure and preventing breaches before they happened.
挑战
The company was facing a significant challenge in managing password vulnerabilities and local administration rights, which were identified as the two biggest security holes. The company's InfoSec team was constantly putting out fires, dealing with security issues as they arose, but there was no strategic approach to preventing these issues from occurring in the first place. The company needed a solution that would allow them to take a proactive approach to security, reducing the attack surface within their infrastructure and preventing breaches before they happened.
解决方案
The solution to the company's problems was privileged access management (PAM), specifically the BeyondTrust platform. BeyondTrust was chosen after a two-week 'bake-off' comparing it with a competing product. The platform was rolled out gradually, starting with the C-suite and the InfoSec team, then moving on to early-adopter system administrators. BeyondTrust allowed the company to establish a hierarchy of access privileges, with applications being whitelisted, blacklisted, or graylisted as necessary. The platform also allowed the company to monitor the applications and upgrades being installed by employees, and to generate daily reports for review.
运营影响
  • The company was able to turn around their InfoSec culture and processes, making their infrastructure much more secure.
  • Employees began taking password management and local access privileges seriously.
  • The restrictions imposed by adopting PAM freed everyone in the company to focus on using IT to improve business practices instead of worrying about potential breaches.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

相关案例.

联系我们

欢迎与我们交流!
* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

感谢您的信息!
我们会很快与你取得联系。