BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Securing Access: Protect Service Accounts

January 22, 2018

  • Blog
  • Archive

Traditionally, privileged access management focused on just securing the credential or just securing the account – not both. With security breaches seemingly happening every day, there’s a shift that we want organizations to understand: in order to safeguard your critical systems and data against a breach, you need to control the access to the systems as well as the access to the accounts.

Infographics

Bomgar Six Steps to Secure Access

Step five in Bomgar’s unique Six Steps to Secure Access brings us to one of the most interesting areas of privileged access management – the securing of service accounts, or, what we like to think of as the management of business system up-time.

More often than not, we find that these systems might have the same service account credential for years. In fact, we recently visited a client that had some critical business systems that depended on taking credit cards and reservations, that are also crucial for their business. When we ran our credential discovery on those systems, we were shocked (and we think they were shocked too), to find credentials with passwords that were almost nine and a half years old. Now, these systems were so sensitive and critical for business that the IT ops team hadn't dared change them because if they changed them and those systems went down, there was a real risk of someone in IT being terminated. So, it's understandable (in some ways) why credentials such as these don’t get changed. However, the threat actors love it if they don’t get changed because that’s a credential that they can compromise, then sit on, and they can use with very little fear that they’re going to lose access to it.

6-steps_step-5-blog-image_protect-service-accounts.JPG#asset:21016

So, as part of a robust, secure access strategy, we always recommend including mechanisms and technology to help you secure those service accounts. Check out this free on-demand webinar that shares more details on our six step methodology to help you build a successful defense-in-depth strategy for protecting your organization against today’s cyber threats.

Webcasts

Six Steps to Secure Access for Privileged Insiders and Vendors

Photograph of Chris Herrin

Chris Herrin, Product Manager

Chris Herrin is the Product Manager for Privileged Remote Access and all third-party integrations for the BeyondTrust portfolio. He has been with BeyondTrust (Bomgar) for the last five years, beginning his career on the Sales Development and Solutions Engineering teams. Chris is an active Georgia Bulldogs fan, and has to mention his corgis in every presentation he is a part of.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.