Cloud Help desk

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 6 January 2012

Do you still keep your administrative passwords in text files and spread sheets?

Posted on 02:20 by Unknown
Modern IT and other enterprises are heavily dependent on servers, databases, network devices, security infrastructure and other software applications for their day-to-day operations. These infrastructure are accessed and controlled through administrative passwords. Typically, the applications are used in a shared environment by a group of administrators.

The number of administrative passwords keep on growing as more and more servers, devices and applications are added to the enterprise. Administrators end up virtually struggling with a pile of passwords and face problems on securely storing, managing and sharing the passwords. Spreadsheets, flat files and even print-outs containing the passwords are circulated among the administrators.

This traditional practice brings with it a host of issues such as the following:
  • When one administrator changes a password, it should be updated in all the 'copies'; otherwise, at the most needed time, one would be trying to login with an outdated or old password!
  • Chances of security attacks on the IT infrastructure become very bright
  • The business of the enterprise would be in jeopardy as sensitive passwords remain insecure
In most of the organizations, a common administrative account is created and all the administrators use the same account to access the infrastructure - for instance 'Administrator' on Windows, 'root' on Unix/Linux, 'enable' on Cisco, 'sa' on SQL server etc.

These administrative passwords, also known as 'Shared Administrative Passwords' give unlimited access to the infrastructure to the extent that the user can do virtually anything. This practice brings along with it accountability issues since the super-user is not role-based and actions could not be traced back to a particular user.

According to a research report of Gartner, the shared accounts with superuser privileges or other high-level access rights pose a significant risk in all organizations. Passwords are shared by multiple users who are sanctioned to use those accounts, or they're managed using fragile manual processes. High risks stem from passwords becoming known to others, as well as the lack of individual accountability. (Source: Gartner, Inc., "Toolkit: Password Management Tools for Shared Accounts and Service Accounts", Ant Allan, 11 January 2007).

Also, IT Managers often wish to enforce certain standard password policies - such as usage of strong passwords, curbs on usage of obvious passwords, rotating passwords at periodic intervals etc. The traditional password management lacks provision for all of these policies.

Governmental and industry regulations prescribe severe security measures for protecting passwords and require comprehensive audit records on each and every action on the passwords. In the traditional approach, there is no way to ensure compliance to such regulations.

In short, administrators of enterprises are drowning in a pile of administrative passwords and are struggling to store and manage them securely and effectively.

The Solution

One of the effective ways to securely manage the administrative passwords is to store the passwords in a central, secure storage and automate password management tasks. Deploying 'Password Management Applications' or in simple words, the 'Enterprise Password Managers' can help organizations in controlling access to administrative passwords and in taking total control of the shared administrative passwords.

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include:
  • Eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access
  • Improving IT productivity many times by automating frequent password changes required in critical systems
  • Providing preventive & detective security controls through approval workflow & real-time alerts on password access
  • Meeting security audits and regulatory compliance such as SOX, HIPAA and PCI
Email ThisBlogThis!Share to XShare to Facebook
Posted in password management | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • New Spiceworks Dashboard Gives Technology Vendors a Snapshot of Their Standing With Small and Mid-Size Businesses Worldwide
    AUSTIN, TX, Oct 09, 2012 (MARKETWIRE via COMTEX) -- Today at the fifth annual SpiceWorld conference, Spiceworks(TM), Inc. unveiled the new S...
  • IT Help Desk Softwares List
    List of popular IT help desk softwares in the market. Add any IT help desk software, like or dislike and share your comments about the IT he...
  • SysAid Integrates MDM Into IT Service Management Platform
    IT service management software (ITSM) solutions provider  SysAid Technologies Ltd.  has released SysAid 9.0,  the company’s most recent IT ...
  • Solarwinds Acquired Web Help Desk Software
    Solarwinds , a leading provider of IT management software acquired web help desk software, a provider of online help desk software, for $20...
  • SupportBee, a help desk software aimed at startups and small companies, encourages an all-hands approach : SGE
    SupportBee, a help desk software aimed at startups and small companies, encourages an all-hands approach January 8, 2013 by Terence LEE Su...
  • How ITIL-based IT Help Desk can help Small and Medium Businesses
    Author: ManageEngine Zoho Introduction:   Everybody knows Bob! Bob works in the IT department of a Financial Services company. When the Offi...
  • ServiceDesk Plus Tips and Tricks on Change Management - Best Practices Webinar
    ServiceDesk Plus Tips and Tricks on Change Management -  Best Practices Webinar Presenter: Arvind Parthiban,Technical Advisor & Marketin...
  • Zendesk Now Offers Facebook Private Messages For Customer Service
    Zendesk has a new feature out today, that lets customers send private Facebook messages that automatically go to agents as Zendesk customer...
  • Absolute Software to Acquire LiveTime for IT Help Desk
    Transaction enhances Absolute's Asset Management capability and provides entry to the IT Service Support Management market VANCOUVER , ...
  • SolarWinds Survey Indicates Growing Need for Time-Saving Patch Management Tools to Address Business-Critical Vulnerabilities
    AUSTIN, TX--(Marketwire - Sep 19, 2012) - SolarWinds ( SWI ), a leading provider of powerful and affordable IT management software , today ...

Categories

  • Absolute Software
  • Alloy Navigator
  • CA
  • CA Technologies
  • Frontrange
  • Gartner
  • Help Desk Infographics
  • help desk news
  • Help Desk Software Review
  • Help Desk Software Tips
  • Help Desk Story
  • Help Desk Videos
  • IT Asset Management
  • IT Help Desk Software
  • ITIL
  • Kaseya
  • Landesk
  • List of IT help desk softwares
  • list of top 100 it help desk softwares
  • ManageEngine
  • Parature
  • password management
  • quest software
  • solarwinds
  • Spiceworks
  • SupportBee
  • SysAid
  • Technology
  • Vision HelpDesk
  • web help desk
  • Zendesk

Blog Archive

  • ►  2013 (21)
    • ►  September (3)
    • ►  July (2)
    • ►  June (11)
    • ►  April (3)
    • ►  January (2)
  • ▼  2012 (157)
    • ►  November (2)
    • ►  October (9)
    • ►  September (42)
    • ►  August (23)
    • ►  July (42)
    • ►  June (1)
    • ►  May (6)
    • ►  April (7)
    • ►  March (9)
    • ►  February (6)
    • ▼  January (10)
      • Promote your product here
      • Help Desk Tips & Tricks - Incident Management
      • FrontRange HEAT Help Desk Software Demo
      • Perils of 'Static' Windows Service Accounts
      • Privileged password management: Protection alone i...
      • An automated solution to enforce IT policy on stan...
      • Don’t let your administrative passwords become Pul...
      • Do you still keep your administrative passwords in...
      • Allowing Temporary Access To Sensitive IT Resources
      • How do you control concurrent privileged access to...
  • ►  2011 (46)
    • ►  December (3)
    • ►  November (6)
    • ►  October (14)
    • ►  September (10)
    • ►  August (4)
    • ►  July (4)
    • ►  June (3)
    • ►  April (1)
    • ►  February (1)
Powered by Blogger.

About Me

Unknown
View my complete profile