Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
NEW YORK, NY and SAN FRANCISCO, CA -- (Marketwired) -- 02/25/14 -- BalaBit IT Security (www.balabit.com) today announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology.
Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:
1. Detect/track suspicious user behavior and prevent incidents -- 60 percent considered this the most important factor
2. Control and audit IT service providers
3. Control and audit internal IT staff
4. Support IT/network staff in troubleshooting
5. Support internal business processes (i.e., reporting)
6. Meet/prove compliance with regulatory requirements
7. Control and audit virtual desktop infrastructure (VDI) users
8. Reduce costs for IT operations
9. Support forensics investigations
10. Reduce costs for security audits
"With compliance as the sixth most important reason for companies to deploy PIM, it is reassuring to see that most companies recognize it is more important to increase their operational efficiency by increasing the security level and managing people than only 'checking the box' and passing the audits," said Zoltán Györkő, CEO of BalaBit IT Security.
Altough 98 percent of respondents said that a PAM tool could increase the level of protection to their system security, a relatively high number of 16 percent stated that they have no solution deployed at all to protect against malicious insiders.
"It's disturbing that so many decision-makers are still ignoring the human factor and making their procurement priorities based on the physical and virtual infrastructure. The most commonly used product, firewalls, are completely ineffective against handcrafted attacks, especially APT or internal attacks. It is clear from today's headlines that these types of attacks are happening with much more frequency and are not only a common source of data breaches but the primary source of the most costly cyber attacks," said Györkő.
Additional survey findings include:
About the Survey
BalaBit IT Security conducted this survey between September 2013 and January 2014 by interviewing more than 400 IT professionals including CIOs, CSOs, system administrators, system managers and other IT workers in Europe (mainly in France, Germany, UK and Hungary). 44 percent of respondents work for large, 34 percent for middle size, 22 percent for small size companies. They represented industries including IT and telecom (38 percent), government (26 percent), financial (16 percent), retail (7 percent), manufacturer (5 percent) and healthcare (3 percent) sectors.
Receive Free Expo Pass and Cap
BalaBit is participating in the RSA Conference 2014, Feb. 24-28 in San Francisco in Booth #709 as part of the OATH (Initiative for Open Authentication) Pavillion. Visit the RSA Conference 2014 expo with a free Expo Pass courtesy of BalaBit by using code EC4OATH during registration process. The company is also offering a free baseball cap at https://www.balabit.com/lp/free-expo-pass-for-rsa-conference-2014.
About BalaBit
BalaBit IT Security is an innovative information security company, a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies to help protect customers against internal and external threats and meet security and compliance regulations. As an active member of the open source community, we provide solutions to a uniquely wide range of both open source and proprietary platforms, even for the most complex and heterogeneous IT systems across physical, virtual and cloud environments.
BalaBit is also known as "the syslog-ng company," based on the company's flagship product, the open source log server application, which is used by more than 1 million companies worldwide and became the globally acknowledged de-facto industry standard.
For more information, visit www.balabit.com.
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs