Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Unravelling the World Wide Web and its impact on IT security

October 20, 2017

  • Blog
  • Archive

Last year, 73% of the UK population accessed the internet every day, according to figures from the ONS, and in our workplaces, more and more time is spent online.

Today's workers expect full access to online content in order to do their jobs effectively. With the rising influence of millennial employees, an increasing number expect to be able to access social media and other personal content at all times too.

But what does this mean for security? Breaches are at their highest level in UK history, with the 'McAfee Labs threats report, fourth quarter 2013' noting 288,000 global malware samples each day - around 200 per minute. Heartbleed affected an estimated 600,000 internet sites, while an experiment by McAfee in 2014 revealed that 80% of workers fall for a phishing email at least 14% of the time.

There are a number of security strategies that IT professionals can adopt to combat this rise in security breaches. But we know, from our research with Ponemon as part of the Get on with IT campaign, that perceptions of effectiveness bias efforts towards managing traditional, reactive technologies which may be easier to implement, rather than prioritizing those which are proven strategies, likely to reduce time wasted elsewhere.

The Ponemon study found that IT and security professionals in the US spend 34% of their time managing user profiles and 48% securing the endpoint. The challenge then is to determine ways to improve the IT department's productivity and free up time to be strategic, creative and profitable.

So what's the solution?

To ensure workers have the online freedom they need while preventing attacks, a holistic approach to security based on DiD (defense in depth) strategies is required. Evidence suggests that to combat increasingly complex attack vectors, organizations need to adopt a layered strategy that prioritizes high-impact solutions, such as privilege management, application allow listing and patching.

However, sometimes advanced persistent threats can still slip through the net. Vulnerabilities in web browsers, Java and software such as Adobe Reader and Microsoft Office still exist and malicious code can enter a network as workers go about their daily tasks if the latest patches are not in place.

To close the gap, organizations can turn to sandboxing, which safely contains web threats, isolating any malicious activity. This final layer of defense allows individuals to browse the web freely, so that productivity is unaffected, providing additional security and peace of mind.

Avecto's new endpoint security solution Defendpoint addresses this challenge by providing a three-layered approach to overcome unknown threats, ensuring that the user experience remains a key priority. We know from experience that success depends on addressing the needs of the user, up front and throughout the security project.

See Defendpoint in action here.

Andrew Avanessian

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.