Fraud Management & Cybercrime , Governance , ID Theft

4 Pitfalls of Privileged Access Management

Bomgar's Sam Elliott On Where Organizations Stumble When It Comes to Managing Access Credentials
4 Pitfalls of Privileged Access Management

Privileged access is a hot topic because misuse of privileged access is at the heart of so many security breaches. In fact, recent research from Forrester estimates that 80 percent of security breaches involve privileged credentials. Whether it is insider or third-party privilege, locking down access has never been more important. Sam Elliott of Bomgar says an increasing number of organizations are getting on board with how crucial access management is in security strategy.

"More and more organizations are realizing perimeter security is not enough," says Elliott in a recent interview with Information Security Media Group. "The challenge we see is the traditional responses to managing privileged access and identity access often leave companies exposed, because their focus is too narrow."

In an interview on access management, Elliott discusses:

  • The mistake of protecting only passwords;
  • What to consider when it comes to third-party access;
  • Where blind spots often exist in privilege sprawl.

At Bomgar, Elliott leads a team of product managers responsible for developing strategy and defining, managing and launching new cybersecurity product suites and offerings. Previously, Elliott held similar positions at BMC Software and Numara Software.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.