HomeCII/OTPreventing Unauthorized Access and Data Transfer

Preventing Unauthorized Access and Data Transfer

Published on

spot_img

In a recent press release, Delinea, a leading provider of solutions that extend Privileged Access Management (PAM), announced the launch of Privilege Control for Servers on the Delinea Platform. This new feature aims to enforce least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict lateral movement. By providing a more secure, resilient, and scalable SaaS solution, Delinea is changing the way organizations enforce privilege as the new perimeter of security.

The need for such advanced security measures is underscored by recent data indicating that stolen credentials were involved in nearly half (49%) of breaches in the previous year. Additionally, the average ransomware payout has increased significantly, highlighting the escalating financial stakes for victims. To address these challenges, organizations require a multi-layered security approach that limits privileges and mitigates the impact of ransomware and other threats if credentials are compromised.

Privilege Control for Servers, a key component of the Delinea Platform, elevates privileges on Active Directory identities centrally to enforce least privilege best practices. This allows customers to manage privileged access to Windows, Linux, and Unix servers in hybrid cloud environments while limiting lateral movement. By implementing Multi-Factor Authentication (MFA) at various touchpoints, such as vault log-in, credential access, and server log-in, organizations can enhance identity assurance and meet regulatory requirements.

For remote workers and vendors, VPN-less and agentless privileged remote access provides a secure means of accessing critical resources without compromising security. Privileged activities are consistently authorized based on policies, and remote sessions are recorded and audited to ensure accountability and compliance. Session recording and auditing on the host help prevent data tampering, while unified storage and access simplify administration.

Phil Calvin, Chief Product Officer at Delinea, emphasized the importance of reducing the risk of stolen credentials and lateral movement in the face of evolving threats like ransomware. Privilege Control for Servers adds robust authorization to the Delinea Platform, offering comprehensive protection for privileged activities in complex environments. By enforcing privilege as the new security perimeter, Delinea enhances security, resilience, and scalability for modern enterprises.

The Delinea Platform, built using modern cloud architecture, provides multiple redundancy levels and continuous updates to ensure privileged access is always available. Shared capabilities such as policies, MFA at depth, and AI-driven analytics streamline administration and address evolving threats effectively. Privilege Control for Servers sets the stage for just-in-time and just enough privileges through the Delinea Platform, with future solutions adopting this naming convention for easy identification.

To learn more about Privilege Control for Servers and the Delinea Platform, interested parties can visit the Delinea website. With a focus on reducing risk, ensuring compliance, and simplifying security, Delinea remains committed to providing cutting-edge PAM solutions for organizations worldwide.

Source link

Latest articles

Tarnung als Taktik – Warum Ransomware-Angriffe raffinierter werden

Ransomware-Angreifer verändern ihre Taktiken: Ein umfassender Überblick In der heutigen digitalen Landscape haben Ransomware-Angreifer ihre...

APT28 Unleashes BadPaw and MeowMeow in Ukraine

New Cyber Threat Discovered: Russian Group Targets Ukrainian Organizations with Advanced Malware In a recent...

Fake Laravel Packages Spread RAT Malware

Cybersecurity Alert: Malicious Laravel Utilities Discovered on Packagist Cybersecurity researchers have recently made alarming discoveries...

Coruna iOS Exploit Kit Targets iOS Versions 13 to 17

Google Discovers Pervasive Exploit Kit Targeting iPhones In a significant revelation, Google has identified a...

More like this

Tarnung als Taktik – Warum Ransomware-Angriffe raffinierter werden

Ransomware-Angreifer verändern ihre Taktiken: Ein umfassender Überblick In der heutigen digitalen Landscape haben Ransomware-Angreifer ihre...

APT28 Unleashes BadPaw and MeowMeow in Ukraine

New Cyber Threat Discovered: Russian Group Targets Ukrainian Organizations with Advanced Malware In a recent...

Fake Laravel Packages Spread RAT Malware

Cybersecurity Alert: Malicious Laravel Utilities Discovered on Packagist Cybersecurity researchers have recently made alarming discoveries...