sponsored by CA Technologies
Posted:  01 Jun 2010
Published:  01 Oct 2009
Format:  PDF
Length:  16  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

 

It is in the interest of individual IT managers, the IT department as whole and the overall business to have measures in place to control and monitor privileged users. Manual processes are ineffective and do not provide an audit trail that would satisfy regulators. The one way to ensure this is to put in place tools that fully automate the management of privileged user accounts, the assignment of privileged user access and enable the full monitoring of privileged user activity.






BROWSE RELATED RESOURCES
Access Control | Access Control Software | CIOs | IT Managers | Security Industry | Security Management | Security Software

View All Resources sponsored by CA Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement