Endpoint

5/3/2018
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

6 Enterprise Password Managers That Lighten the Load for Security

EPMs offer the familiar password wallet with more substantial administrative management and multiple deployment models.
Previous
1 of 7
Next

Image Source: Blackboard via Shutterstock

Image Source: Blackboard via Shutterstock

Companies may try to promote good password hygiene among users, but obstacles remain fairly profound, even after years of prodding by IT and security managers.

What better time than World Password Day to explore this issue?

Frank Dickson, a research director within IDC’s Security Products research practice, says given the threat level and the reality that the average individual user can have 130 or more unique accounts, it’s unrealistic to expect that all those passwords can be managed manually.

Dickson says the only way to successfully solve the password problem is for the company to deploy identity and access management tools. For organizations starting from scratch, Dickson says Enterprise Password Management (EPMs) systems are a very good first step.

Keep in mind that passwords are still a thorny problem for many companies. According to Forrester Research, of enterprise organizations that have suffered at least one data breach from an external attack, cybercriminals used stolen user credentials to carry out 31% of the attacks.

The cost of a single breach runs high, as does the cost of managing passwords. Forrester’s Merritt Maxim, a principal analyst, says several large U.S.-based organizations across different verticals spend more than $1 million annually on just password-related support costs. And while SAML-based single sign-on (SSO) tools can alleviate the password burden, Maxim says many organizations rely on a hybrid heterogeneous computing environment that very often does not support SAML. This means companies still have to rely on password-based authentication for many of their systems.

Maxim says some security teams also rely on a shared spreadsheet or Word document to store and track passwords, especially for privileged accounts. Such practices have become a major security risk because malicious insiders can compromise these documents.

"The other thing to remember is that [lost or stolen] passwords also have an indirect effect on employee productivity," Maxim says. "Every minute an employee spends unable to access a system because of a lockout is lost productivity."

EPMs can help, says Maxim, because they offer the familiar password wallet model with more substantial administrative management tools, as well as multiple deployment models.

The following list is based on interviews with Dickson and Maxim. We tried to stick with pure-play EPMs as opposed to SSO or PAM products.  

 

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
szurier210
50%
50%
szurier210,
User Rank: Apprentice
5/7/2018 | 12:18:22 PM
Re: Eh??? List
Go up top near headline and see 1-7 bar on right, click on that and it will take you to the products. Thanks for touching base. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/7/2018 | 7:55:14 AM
Eh??? List
Article cuts off before your list of products is displayed - great security rule I suppose. 
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17321
PUBLISHED: 2018-09-22
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
CVE-2018-17322
PUBLISHED: 2018-09-22
Cross-site scripting (XSS) vulnerability in index.php/index/category/index in YUNUCMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the area parameter.
CVE-2018-14889
PUBLISHED: 2018-09-21
CouchDB in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local code execution vulnerability.
CVE-2018-14890
PUBLISHED: 2018-09-21
Vectra Networks Cognito Brain and Sensor before 4.2 contains a cross-site scripting (XSS) vulnerability in the Web Management Console.
CVE-2018-14891
PUBLISHED: 2018-09-21
Management Console in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local privilege escalation vulnerability.