HomeCII/OTPreventing Unauthorized Access and Data Transfer

Preventing Unauthorized Access and Data Transfer

Published on

spot_img

In a recent press release, Delinea, a leading provider of solutions that extend Privileged Access Management (PAM), announced the launch of Privilege Control for Servers on the Delinea Platform. This new feature aims to enforce least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict lateral movement. By providing a more secure, resilient, and scalable SaaS solution, Delinea is changing the way organizations enforce privilege as the new perimeter of security.

The need for such advanced security measures is underscored by recent data indicating that stolen credentials were involved in nearly half (49%) of breaches in the previous year. Additionally, the average ransomware payout has increased significantly, highlighting the escalating financial stakes for victims. To address these challenges, organizations require a multi-layered security approach that limits privileges and mitigates the impact of ransomware and other threats if credentials are compromised.

Privilege Control for Servers, a key component of the Delinea Platform, elevates privileges on Active Directory identities centrally to enforce least privilege best practices. This allows customers to manage privileged access to Windows, Linux, and Unix servers in hybrid cloud environments while limiting lateral movement. By implementing Multi-Factor Authentication (MFA) at various touchpoints, such as vault log-in, credential access, and server log-in, organizations can enhance identity assurance and meet regulatory requirements.

For remote workers and vendors, VPN-less and agentless privileged remote access provides a secure means of accessing critical resources without compromising security. Privileged activities are consistently authorized based on policies, and remote sessions are recorded and audited to ensure accountability and compliance. Session recording and auditing on the host help prevent data tampering, while unified storage and access simplify administration.

Phil Calvin, Chief Product Officer at Delinea, emphasized the importance of reducing the risk of stolen credentials and lateral movement in the face of evolving threats like ransomware. Privilege Control for Servers adds robust authorization to the Delinea Platform, offering comprehensive protection for privileged activities in complex environments. By enforcing privilege as the new security perimeter, Delinea enhances security, resilience, and scalability for modern enterprises.

The Delinea Platform, built using modern cloud architecture, provides multiple redundancy levels and continuous updates to ensure privileged access is always available. Shared capabilities such as policies, MFA at depth, and AI-driven analytics streamline administration and address evolving threats effectively. Privilege Control for Servers sets the stage for just-in-time and just enough privileges through the Delinea Platform, with future solutions adopting this naming convention for easy identification.

To learn more about Privilege Control for Servers and the Delinea Platform, interested parties can visit the Delinea website. With a focus on reducing risk, ensuring compliance, and simplifying security, Delinea remains committed to providing cutting-edge PAM solutions for organizations worldwide.

Source link

Latest articles

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...

Reducing Threats from the IABs Market

As ransomware attacks continue to escalate in frequency and severity, one of the key...

More like this

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...
en_USEnglish