BrandPost: 5 Steps to Securing Privileged Access for Outsourced IT

According to Gartner, IT outsourcing will be a $335 billion industry by 2019. Within the growing number of IT organizations adopting this approach to managing infrastructure, outsourced IT administrators are routinely granted broad privileges to accomplish even the most narrowly focused tasks.

However, traditional privileged identity management solutions require organizations to create and manage identities for outsourced IT administrators within their internal environment and grant full VPN access. This practice increases risk, as the gap between the number of disconnected privileged accounts and an authoritative identity provider grows, and more laptops establish VPN connections to internal networks. The result is an expansion of potential attack points for hackers, disgruntled insiders, and malware.

To read this article in full or to leave a comment, please click here


– Go to Original Source – (link)

Powered by WPeMatico

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *