six steps to secure access - beyondtrust · 2017-10-24 · six steps to secure access the six steps...

2
SIX STEPS TO SECURE ACCESS The six steps outline a layered defense methodology for securing access pathways to your network and reducing risks related to privileged credentials. Bomgar's unique "access first" approach enables your organization to fight threat actors immediately and begin realizing the benefits of your security investment from day one. Secure the Connection Defend the Credential ROTATE & RANDOMIZE PRIVILEGED CREDENTIALS Stop lateral movement by eliminating common credentials across endpoints and regularly changing passwords automatically SECURE VENDOR ACCESS Eliminate the use of VPN for vendors and gain granular control and insight into their activity SECURE INSIDER ACCESS Enforce least privilege policies to prevent both intentional and accidental misuse by employees SAFELY STORE PASSWORDS Store privileged credentials in a password vault to prevent users from sharing or compromising them PROTECT SERVICE ACCOUNTS Rotate critical service account credentials without interrupting systems and maintaining business uptime FORTIFY APP TO APP SECURITY Stop malicious users from compromising credentials that are hard coded in a script or application 1 2 3 4 5 6

Upload: others

Post on 04-Jul-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SIX STEPS TO SECURE ACCESS - BeyondTrust · 2017-10-24 · SIX STEPS TO SECURE ACCESS The six steps outline a layered defense methodology for securing access pathways to your network

SIX STEPS TO SECURE ACCESSThe six steps outline a layered defense methodology for securing access pathways to your network and reducing risks related to privileged credentials. Bomgar's unique "access �rst" approach enables your organization to �ght threat actors immediately and begin realizing the bene�ts of your security investment from day one.

Secure the Connection

Defend the Credential

ROTATE & RANDOMIZE PRIVILEGED CREDENTIALSStop lateral movement by eliminating common credentials across endpoints and regularly changing passwords automatically

SECURE VENDOR ACCESSEliminate the use of VPN for vendors and gain granular control and insight into their activity

SECURE INSIDER ACCESSEnforce least privilege policies to prevent both intentional and accidental misuse by employees

SAFELY STORE PASSWORDSStore privileged credentials in a password vault to prevent users from sharing or compromising them

PROTECT SERVICE ACCOUNTSRotate critical service account credentials without interrupting systems and maintaining business uptime

FORTIFY APP TO APP SECURITYStop malicious users from compromising credentials that are hard coded in a script or application

1

2

3

4

5

6

Page 2: SIX STEPS TO SECURE ACCESS - BeyondTrust · 2017-10-24 · SIX STEPS TO SECURE ACCESS The six steps outline a layered defense methodology for securing access pathways to your network

Make Least Privilege Productive

Bomgar enables employees and vendors to access systems and support people easily, while protecting credentials and endpoints from threats. Increase access speed and agility, while enforcing least privilege best practices, to simultaneously

drive business performance and security.

Learn more at www.bomgar.com

Employees and vendors with remote access to systems and privileged credentials are a prime target for cyber attacks. A good defense-in-depth strategy addresses both access and credentials,

while supporting business productivity.

Are you safe from today’s threat landscape?

Remote Access Pathways Weak or Stolen Passwords

EASE OF COMPROMISE

It is extremely easy for threat actors to �nd unsecured remote access pathways into your network

LACK OF VISIBILITY

Most security organizations simply don't know all of the remote access pathways being used by their employees and vendors

NON-STANDARDIZED TOOLS

Di�erent teams & external vendors often use their own unsecured or free remote access tools

NETWORK COMPLEXITY

IT groups typically have no centralized monitoring or auditing of remote access into their networks

KEYS TO THE KINGDOM

Hackers target privileged accounts that will allow them in to critical systems, or pivot to other systems

SHARED PASSWORDS

Administrative accounts and passwords are often shared across teams and usage activity can't be tracked to a speci�c person

DIFFICULT TO TRACK

Many organizations forget about privileged credentials used by service desks, service accounts, app to app, third-parties, etc

PHISHING ATTACKS

Sophisticated phishing techniques mimic log-in screens to steal credentials

*TRUSTWAVE GLOBAL SECURITY REPORT 2017 **VERIZON DATA BREACH INVESTIGATIONS REPORT 2017

Unsecured remote access tools are the #1 method of compromise*

81% of hacking-related breaches leveraged stolen and/or weak password**

CONTACT I [email protected] I 866-205-3650 (U.S.) I +44 (0)1628-480-210 (U.K./EMEA) I BOMGAR.COM

©2017 Bomgar corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.