BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

New study finds half of companies provide employees with administrative rights

January 30, 2018

  • Blog
  • Archive

Over 50 percent of IT companies admit to providing their employees with local administrative privileges on Windows computers, despite the associated security threats, according to new insight from global security software company, Avecto. Of the 504 IT and security professionals surveyed across North America, the UK and Europe, a quarter were unsure about which users within their organisation have been assigned local admin privileges.

According to results, UK and European businesses have slightly more control over admin rights, with 45 percent of businesses in the UK and 40 percent of European businesses admitting to the use of local admin privileges, compared to 70 percent in the US. However, managers across these regions are still not confident in their visibility over who has these privileges, with 29 percent of IT managers in the UK and 19 percent in Europe unsure about this.

"These findings show that many companies are still not putting appropriate measures in place to counter the threat of admin rights," said Andrew Avanessian, chief operating officer at Avecto. "This is such a big mistake, because unnecessary admin privileges increase the risk of sensitive and business-critical data being deleted or shared, even accidentally."

The perception many companies have is that it’s extremely difficult to remove admin rights and time consuming to maintain the resulting environment. According to a report by Gartner, “the common misconception is that a user with local admin rights can do little harm and that administrative actions taken at the endpoint are isolated to the endpoint itself. Neither assertion is true." Gartner, Inc., "Reduce Access to Windows Local Administrator with Endpoint Privilege Management," Lori Robinson, October 20, 2017.

Avanessian continued: "Many of 2017's most famous data breaches including WannaCry and NotPetya could have been mitigated if basic controls such as privilege management and application control were in place to stop the attack from launching and spreading. The right technology, which is often simple to implement, means organizations no longer need to compromise - you can ensure that employees have what they need to perform their role while safeguarding the business from attacks."

Gartner Research, Reduce Access to Windows Local Administrator With Endpoint Privilege Management, 20 October 2017

Click here to view the infographic >

Photograph of Jonathan Clarke

Jonathan Clarke, Content Marketing Manager

With a Master's Degree in English Language and Media, Jonathan has a genuine passion for producing compelling and thoroughly researched cybersecurity content. Coupled with a B2B agency background, he is adaptable to a wide range of industry topics, and also looks after BeyondTrust's Public Relations and social media channels. A huge animal lover, he is the proud 'father' of Simba, a very hyperactive German Shepherd dog.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Capabilities to NIST SP 800-207

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.