Resolving the Privilege Management Paradox: Quest Solutions for Strong Access Control
Source: Enterprise Management Associates
Many have focused on the risks to sensitive information posed by a seemingly unending wave of data security breaches in the last few years - and justifiably so. These breaches often involve the exploit of hundreds or thousands of identities. Compare this, however, to the impact of exploiting of a single identity: that of the system administrator, the "Root" account, and similar forms of privileged access to direct control over IT.