Earning the privilege: Privilege management

Earning the privilege: Privilege management
Earning the privilege: Privilege management

With Windows 7 migrations in full swing, few would argue the advantages of a strong privilege management solution for IT. A recent vendor survey shows a 463 percent jump in demand to implement privilege management among companies moving this year to Windows 7. Sixty-three percent of respondents consider it critical to manage administrative privileges for end-users to ensure security and reduce vulnerabilities. 

When users don't have local administrator rights, they can't make changes that destabilize the system, or require extra support to correct the problems they accidentally create. Additionally, a locked-down system is less susceptible to malware. 

But by its very name, a “personal computer” is generally seen by a user as “my device.” Many organizations allow users to run with local admin rights simply because it's too difficult to keep systems locked down. 

But removing admin rights is only a part of the fix. There are legitimate situations that require elevated privileges for users to accomplish their jobs. What companies really need is a way for users who need those rights to gain those privileges smoothly. 

How do you accomplish that? A strong privilege management solution needs to take individual and collective user needs into consideration. Users have a set of things they do to get their jobs done, and they expect to be able to perform their necessary work without IT intervention. If users have been able to perform certain tasks on their own in the past, they are naturally going to expect that right to still be in place after a desktop lockdown happens. 


close

Next Article in Features

More in Features

Behind the scenes: Privacy and data-mining

Behind the scenes: Privacy and data-mining

With data-mining firms harvesting personal information from online activity, privacy advocates, if not yet consumers, are alarmed, reports James Hale.

The great divide: Reforming the CFAA

The great divide: Reforming the CFAA

Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent enforcement weapon, reports Dan Kaplan.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.