Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Don’t Be A Target: Protect and Secure Privileged Accounts with Bomgar

June 29, 2017

  • Blog
  • Archive

Does your service desk use accounts that have workstation admin credentials to support users? If so, your service desk staff are “privileged” users. If those credentials are stolen or compromised, they can be used by an attacker to move laterally across your network in mere hours or minutes. Security professionals have often overlooked help desks as privileged users, but more and more are looking to lock down these accounts or take privileges away. But admin credentials are crucial for service desks to be productive.

So what exactly is a privileged account? They are:

  • “Administrator” of the local computer
  • “Superuser” used to perform administrative tasks
  • Built into every IT application and system
  • Typically shared among several people

 

If these accounts are so crucial, why are they also so problematic? Here’s a few reasons:

  • They have a lot of power
  • They are shared
  • They are stored insecurely
  • They are anonymous (not managed or audited)
  • Secure credentials in an enterprise password vault
  • Randomize passwords of local administrator accounts
  • Rotate passwords after each use for privileged domain accounts

 

All of the above-mentioned points make privileged accounts the prize for hackers. With cyber breaches showing no sign of slowing down, targeted attacks on corporate IT networks have increased in scale and public visibility. A hacker’s main objective is to bypass perimeter security, by stealing legitimate credentials (your privileged credentials) to gain access to your machine, and then ultimately move laterally across the network.


Given that privileged accounts are a main target, how can your organization balance both productivity and security? Here’s a few tips:  


  • Secure credentials in an enterprise password vault
  • Randomize passwords of local administrator accounts
  • Rotate passwords after each use for privileged domain accounts


For a closer look into how to protect privileged accounts, and how Bomgar’s solutions can help you secure service desk credentials without affecting productivity, check out this webcast recording.

Bryan Hood

Director of Solutions Engineering

As Director of Solutions Engineering at BeyondTrust, Bryan and his team work closely with both prospects and customers to evaluate their needs for securing access to users and business critical systems, while still enhancing IT productivity. He consistently speaks about benefits of securing remote access and privileged access for numerous trade shows and while visiting clients. Prior to joining BeyondTrust, Bryan worked as a Senior System Engineers and Messaging Architect for several large corporations, and also worked as a contractor to the Department of Defense in these roles. With more than 20 years of experience, he helps drive efficiency, productivity, and security through assisting with installation and helping clients maximize on their BeyondTrust investment.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 25, 2021

Customer Tips & Tricks: Remote Support for Android

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.