e-DMZ Announces Free Remote Access Security Tool - InformationWeek
IoT
IoT
Mobile
News
8/11/2010
12:44 PM
50%
50%

e-DMZ Announces Free Remote Access Security Tool

The Total Privileged Access Management suite module enables IT managers to perform password administration over unsecured LAN and WAN connections.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
For companies subject to government or industry regulations like Sarbanes-Oxley, PCI DSS or HIPAA, sending database passwords "in the clear" -- unencrypted, and readable by any network eavesdropper -- spells compliance disaster. Even for companies not subject to regulatory compliance, it's still a security vulnerability.

And as more database admin gets done over the company network, or even by an IT services provider remotely over the Internet, rather than from a console attached directly to the server, passwords are at risk. And, according to Kris Zupan, CTO, e-DMZ Security, a privileged user and privileged access management vendor, most databases do password management in the clear.

To aid businesses in managing this risk, e-DMZ Security has announced a free remote access security tool for password management, for use with the Privileged Password Management module of its Total Privileged Access Management (TPAM) suite.

e-DMZ's TPAM lets companies meet security and compliance requirements associated with privileged identity management and privileged access control -- managing privileged users, access, accounts and rights, as well as monitoring and recording all activities,

The new security feature enables database administrators, including IT staff, contractors, service providers and others doing database administration, to perform password administration over unsecured LAN and WAN connections.

"We had several customers managing passwords for databases" -- and some of these were not directly at the server, but were connecting either from elsewhere within the office, or via the Internet, according to Zupan. "This presented a major compliance issue."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of Data and Analytics
Today's companies are differentiating themselves using data analytics, but the journey requires adjustments to people, processes, technology, and culture. 
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll