Privileged Identity Management

Oracle storage devices ZS3 – Unparalleled Efficiency for Oracle Applications
October 20, 2016
Virtual Storage Platform HDS
HITACHI INTRODUCE THE NEW MID-RANGE STORAGE SYSTEM
October 20, 2016

Privileged Identity Management is a component of Identity Management, focused on the special requirements for accounts with more power in the IT infrastructure of enterprises. It is often used as a tool for information security and management to help companies meet compliance regulations and prevent violations of internal data through the use of the special account rights.

An information technology infrastructure of the organization basically comprised of various components such as servers, firewalls, databases, network devices, … All these components are controlled by using a series of privileged accounts (root account of UNIX server, Oracle SYS account of the Oracle database system, the Administrator account of Windows servers, …)

The privileged account has full access to the resources of the respective system. Usually there are hundreds, even thousands of these accounts exist in enterprises and organizations. The management of all these accounts are very complex, difficult and caused the error in the Privileged Identity Management. This also creates the security hole and is one of the main reasons prolong the recovery process from the fault of IT administrator.

On the market today, some companies analyze the market refers to the term “PXM” include many similar concepts:

  • Privileged User Management.
  • Privileged Access Management.
  • Privileged Account Management.
  • Privileged Password Management.

According to one study by PwC: 56% of senior leader said that most serious fraud are due to user privileges.

Forrester evaluated: Without controlling deployment privileges users, customers will be faced with the risk of reducing the quality of service, recovery cost, the development team can access sensitive data, reduced levels of user satisfaction … Applying PIM solutions help you solve five major challenges:

  • Reduce the risk inside.
  • Ensure compliance.
  • Attack prevent targeted (APT).
  • Ensure virtualization security environments.
  • Towards a cloud security service.