Endpoint

5/3/2018
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

6 Enterprise Password Managers That Lighten the Load for Security

EPMs offer the familiar password wallet with more substantial administrative management and multiple deployment models.
Previous
1 of 7
Next

Image Source: Blackboard via Shutterstock

Image Source: Blackboard via Shutterstock

Companies may try to promote good password hygiene among users, but obstacles remain fairly profound, even after years of prodding by IT and security managers.

What better time than World Password Day to explore this issue?

Frank Dickson, a research director within IDC’s Security Products research practice, says given the threat level and the reality that the average individual user can have 130 or more unique accounts, it’s unrealistic to expect that all those passwords can be managed manually.

Dickson says the only way to successfully solve the password problem is for the company to deploy identity and access management tools. For organizations starting from scratch, Dickson says Enterprise Password Management (EPMs) systems are a very good first step.

Keep in mind that passwords are still a thorny problem for many companies. According to Forrester Research, of enterprise organizations that have suffered at least one data breach from an external attack, cybercriminals used stolen user credentials to carry out 31% of the attacks.

The cost of a single breach runs high, as does the cost of managing passwords. Forrester’s Merritt Maxim, a principal analyst, says several large U.S.-based organizations across different verticals spend more than $1 million annually on just password-related support costs. And while SAML-based single sign-on (SSO) tools can alleviate the password burden, Maxim says many organizations rely on a hybrid heterogeneous computing environment that very often does not support SAML. This means companies still have to rely on password-based authentication for many of their systems.

Maxim says some security teams also rely on a shared spreadsheet or Word document to store and track passwords, especially for privileged accounts. Such practices have become a major security risk because malicious insiders can compromise these documents.

"The other thing to remember is that [lost or stolen] passwords also have an indirect effect on employee productivity," Maxim says. "Every minute an employee spends unable to access a system because of a lockout is lost productivity."

EPMs can help, says Maxim, because they offer the familiar password wallet model with more substantial administrative management tools, as well as multiple deployment models.

The following list is based on interviews with Dickson and Maxim. We tried to stick with pure-play EPMs as opposed to SSO or PAM products.  

 

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
szurier210
50%
50%
szurier210,
User Rank: Apprentice
5/7/2018 | 12:18:22 PM
Re: Eh??? List
Go up top near headline and see 1-7 bar on right, click on that and it will take you to the products. Thanks for touching base. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/7/2018 | 7:55:14 AM
Eh??? List
Article cuts off before your list of products is displayed - great security rule I suppose. 
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.