six steps to secure access - beyondtrust · 2017-10-24 · six steps to secure access the six steps...
TRANSCRIPT
SIX STEPS TO SECURE ACCESSThe six steps outline a layered defense methodology for securing access pathways to your network and reducing risks related to privileged credentials. Bomgar's unique "access �rst" approach enables your organization to �ght threat actors immediately and begin realizing the bene�ts of your security investment from day one.
Secure the Connection
Defend the Credential
ROTATE & RANDOMIZE PRIVILEGED CREDENTIALSStop lateral movement by eliminating common credentials across endpoints and regularly changing passwords automatically
SECURE VENDOR ACCESSEliminate the use of VPN for vendors and gain granular control and insight into their activity
SECURE INSIDER ACCESSEnforce least privilege policies to prevent both intentional and accidental misuse by employees
SAFELY STORE PASSWORDSStore privileged credentials in a password vault to prevent users from sharing or compromising them
PROTECT SERVICE ACCOUNTSRotate critical service account credentials without interrupting systems and maintaining business uptime
FORTIFY APP TO APP SECURITYStop malicious users from compromising credentials that are hard coded in a script or application
1
2
3
4
5
6
Make Least Privilege Productive
Bomgar enables employees and vendors to access systems and support people easily, while protecting credentials and endpoints from threats. Increase access speed and agility, while enforcing least privilege best practices, to simultaneously
drive business performance and security.
Learn more at www.bomgar.com
Employees and vendors with remote access to systems and privileged credentials are a prime target for cyber attacks. A good defense-in-depth strategy addresses both access and credentials,
while supporting business productivity.
Are you safe from today’s threat landscape?
Remote Access Pathways Weak or Stolen Passwords
EASE OF COMPROMISE
It is extremely easy for threat actors to �nd unsecured remote access pathways into your network
LACK OF VISIBILITY
Most security organizations simply don't know all of the remote access pathways being used by their employees and vendors
NON-STANDARDIZED TOOLS
Di�erent teams & external vendors often use their own unsecured or free remote access tools
NETWORK COMPLEXITY
IT groups typically have no centralized monitoring or auditing of remote access into their networks
KEYS TO THE KINGDOM
Hackers target privileged accounts that will allow them in to critical systems, or pivot to other systems
SHARED PASSWORDS
Administrative accounts and passwords are often shared across teams and usage activity can't be tracked to a speci�c person
DIFFICULT TO TRACK
Many organizations forget about privileged credentials used by service desks, service accounts, app to app, third-parties, etc
PHISHING ATTACKS
Sophisticated phishing techniques mimic log-in screens to steal credentials
*TRUSTWAVE GLOBAL SECURITY REPORT 2017 **VERIZON DATA BREACH INVESTIGATIONS REPORT 2017
Unsecured remote access tools are the #1 method of compromise*
81% of hacking-related breaches leveraged stolen and/or weak password**
CONTACT I [email protected] I 866-205-3650 (U.S.) I +44 (0)1628-480-210 (U.K./EMEA) I BOMGAR.COM
©2017 Bomgar corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.