Review: Stop insider attacks with these 6 powerful tools

Privileged Identity Management (PIM) products from BeyondTrust, CyberArk, Lieberman, NetIQ, Centrify and Viewfinity control super-user access to programs and processes

defenses against super attackes 1

Privileged Identity Management is based on the idea that a common element of most advanced threats involves obtaining the credentials of an administrator, super-user or even a program with local admin rights. Armed with those credentials, the attacker can turn internal systems against themselves, rewrite security policies and remain undetected.

Privileged Identity Management tools lock down those special user credentials so that even successful breaches are only done against low-level endpoints that can’t do much harm. Should attackers on a compromised system attempt to elevate those privileges, not only will they be quickly detected, but any process that attempts to run will be blocked.

For this review, we looked at BeyondTrust, Lieberman Software, NetIQ, CyberArk, Centrify and Viewfinity. This is still an evolving area, and companies are approaching it from different perspectives. For that reason, this is not a head-to-head comparison, but more of an analysis of how each vendor approaches PIM.

To continue reading this article register now

7 inconvenient truths about the hybrid work trend
Shop Tech Products at Amazon