Welcome!

Open Source Cloud Authors: Liz McMillan, Zakia Bouachraoui, William Schmarzo, Elizabeth White, Yeshim Deniz

News Feed Item

Survey Reveals Enterprises Grossly Unprepared to Prevent Exposure to Insider Fraud, Corporate Espionage and Nation-State-Sponsored Attacks

Majority of Organizations Inefficiently Controlling Access to Vital Systems

MOUNTAIN VIEW, CA -- (Marketwire) -- 02/22/12 -- Fox Technologies (FoxT), Incorporated, a leading provider of Enterprise Access Management (EAM) solutions, today announced the results of a recent survey of 327 information security professionals conducted in partnership with Echelon One, an IT security research leader specializing in security programs and guidance. The findings revealed that a startling majority of respondents, 59 percent, are using home-grown solutions (12 percent), sudo (10 percent), or manual enforcement of privileged user access and passwords (37 percent) to control access to enterprise servers. All of these methods expose the organization to insider fraud, corporate espionage, and nation-state-sponsored attacks. Enterprises also reported implementation of outdated access management technologies, which allows the theft and misuse of intellectual property and customer data once the network is compromised. Recognizing the risk of poor access management, 69 percent of organizations polled planned to pursue access management as a key strategic initiative for IT in 2012.

Risk and Consequences

"The threats organizations face continue to become more aggressive and expose them to a range of losses from intellectual property, customer lists, strategic plans and state secrets," said Bob West, CEO and Founder of Echelon One. "Failing to control access to mission critical servers and data creates both economic and national defense issues we need to address immediately."

The survey revealed these key findings:

  • Manual enforcement of privileged-user access and passwords remains prevalent among 37 percent of enterprises polled.

    Failure to automate access-management controls results in the sharing of privileged passwords. Once passwords are shared across multiple accounts users begin taking administrative shortcuts, enterprises are unable to track actions back to a specific user. Manual enforcement of privileged-user access represents an opportunity for data compromise and is the number-one compliance risk.

  • Potential for insider fraud is widespread, with 76 percent of respondents unable to automatically administer user accounts across multiple servers.

    Potential for access creep emerges when enterprises cannot automatically administer user accounts across the entirety of their server farm. Access creep results when employees accrue unmanaged access rights throughout their careers at an organization, resulting in more privilege than is established by their positions. Without central consoles that can administer user accounts across multiple servers, IT is unable to manually administer each individual user account within the organization due to a lack of available resources and staff.

  • 73 percent of respondents reported that they are unable to centrally define the access rules and policies necessary to map access to employee role.

    Enterprises that are unable to centrally define rules and policies create the opportunity for user-access controls to change from server to server, enabling data compromise and accelerating the operational costs of manual enforcement.

  • Enterprises lack the critical infrastructure to enforce server access: 42 percent of those surveyed are unable to implement multi-factor authentication, and 37 percent are not able to define and enforce granular authorization rules.

    The inability to automatically authorize and enforce who can access which servers, and even what commands they can execute based on the context of the request leaves enterprises open to the risk of a data breach.

"All too often enterprises focus their security strategies on network perimeter defense while maintaining compliance standards for access control to only a small subset of their servers," said Subhash Tantry, CEO, FoxT. "2011's prolific compromises proved that enterprises will continue to be targeted and fall victim to more sophisticated attacks. Proactive fine-grained authorization and policy enforcement, in addition to contextual authentication, must be in place to ensure only the authorized users have access to enterprise data with the assumption the network has already been breached."

Best Practices

FoxT and Echelon One recommend that organizations implement the following best practices to properly mitigate risk due to poor access management:

1. Automatically enforce access privileges with proactive, granular authorization and command controls
2. Deploy integrated, contextual, multifactor authentication
3. Add access management to AD, LDAP and IDM solutions to automate creation and removal of user accounts
4. Use the richest tools possible to authenticate users (biometrics, encryption and others)
5. Centralize account administration and manage access accounts across all server environments (Windows, Unix/Linux and virtual).

Investing in Control for 2012

The survey also revealed that over two-thirds of respondents plan to invest in access-management technologies in 2012 as part of their organization's strategic IT initiatives. Enterprises recognize the threat of unauthorized access to intellectual property and plan to explore the following areas of access management:

  • 25 percent plan to invest in controlling access to virtual and cloud-based resources
  • 23 percent plan to invest in local Windows account-control on servers and desktops
  • 23 percent plan to invest in controlling access from mobile devices
  • 17 percent plan to invest in controlling access to business applications
  • 12 percent plan to invest in attribute-based access management

Methodology
The 2012 Access Control Audit evaluated 327 participant organizations through an independent online survey conducted in December of 2011. Respondent organizations came from diverse industries including high tech (19 percent), banking and financial (15 percent), manufacturing (9 percent), government (7 percent), energy and oil/gas (6 percent), transportation (6 percent), healthcare (6 percent), retail (5 percent), services (5 percent) and education (5 percent) in addition to unidentified industries (9 percent). Twenty-seven percent of respondents represented organizations employing more than 5,000 individuals. Respondents included professionals ranging from administrators to the C-Suite: CEOs (4 percent), CTOs (5 percent), CSOs (6 percent), CIOs (14 percent), administrators (18 percent), managers (30 percent) and others (23 percent).

Access the full report here: Privileged Access Management Report: Survey Results and Best Practices (http://www.foxt.com/pdf/FoxT_Privileged%20Access%20Management%20Report.pdf)

About FoxT
FoxT protects corporate assets with an enterprise access management solution that centrally enforces granular access entitlements, in real-time, across operating systems and business applications on any networked device. The ability to proactively administer, authenticate, authorize and audit access across diverse platforms, down to the operating system resource level, enables organizations to greatly reduce compliance and audit costs, streamline IT security administration and protect corporate value by mitigating the risk of insider fraud. Headquartered in Mountain View, California, FoxT serves Global 1000 customers in 32 countries. For more information -- www.foxt.com or email [email protected].

Media Contact:
Justin Gillespie
Trainer Communications
[email protected]
925-271-8215



Lynne Courts
Vice President-Marketing
650 687 6278
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...