Endpoint

5/3/2018
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

6 Enterprise Password Managers That Lighten the Load for Security

EPMs offer the familiar password wallet with more substantial administrative management and multiple deployment models.
Previous
1 of 7
Next

Image Source: Blackboard via Shutterstock

Image Source: Blackboard via Shutterstock

Companies may try to promote good password hygiene among users, but obstacles remain fairly profound, even after years of prodding by IT and security managers.

What better time than World Password Day to explore this issue?

Frank Dickson, a research director within IDC’s Security Products research practice, says given the threat level and the reality that the average individual user can have 130 or more unique accounts, it’s unrealistic to expect that all those passwords can be managed manually.

Dickson says the only way to successfully solve the password problem is for the company to deploy identity and access management tools. For organizations starting from scratch, Dickson says Enterprise Password Management (EPMs) systems are a very good first step.

Keep in mind that passwords are still a thorny problem for many companies. According to Forrester Research, of enterprise organizations that have suffered at least one data breach from an external attack, cybercriminals used stolen user credentials to carry out 31% of the attacks.

The cost of a single breach runs high, as does the cost of managing passwords. Forrester’s Merritt Maxim, a principal analyst, says several large U.S.-based organizations across different verticals spend more than $1 million annually on just password-related support costs. And while SAML-based single sign-on (SSO) tools can alleviate the password burden, Maxim says many organizations rely on a hybrid heterogeneous computing environment that very often does not support SAML. This means companies still have to rely on password-based authentication for many of their systems.

Maxim says some security teams also rely on a shared spreadsheet or Word document to store and track passwords, especially for privileged accounts. Such practices have become a major security risk because malicious insiders can compromise these documents.

"The other thing to remember is that [lost or stolen] passwords also have an indirect effect on employee productivity," Maxim says. "Every minute an employee spends unable to access a system because of a lockout is lost productivity."

EPMs can help, says Maxim, because they offer the familiar password wallet model with more substantial administrative management tools, as well as multiple deployment models.

The following list is based on interviews with Dickson and Maxim. We tried to stick with pure-play EPMs as opposed to SSO or PAM products.  

 

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
szurier210
50%
50%
szurier210,
User Rank: Apprentice
5/7/2018 | 12:18:22 PM
Re: Eh??? List
Go up top near headline and see 1-7 bar on right, click on that and it will take you to the products. Thanks for touching base. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/7/2018 | 7:55:14 AM
Eh??? List
Article cuts off before your list of products is displayed - great security rule I suppose. 
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0341
PUBLISHED: 2018-07-16
A vulnerability in the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware before 11.2(1) could allow an authenticated, remote attacker to perform a command injection and execute commands with the privileges of the web server. The vulnerability is due to insufficie...
CVE-2018-0360
PUBLISHED: 2018-07-16
ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.
CVE-2018-0361
PUBLISHED: 2018-07-16
ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.
CVE-2018-0366
PUBLISHED: 2018-07-16
A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to...
CVE-2018-0368
PUBLISHED: 2018-07-16
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, local attacker to access sensitive information on an affected system. The vulnerability is due to insufficient security restrictions imposed by the affected software. An attacker could exploit this vulne...