Keeping Microsoft Servers Protected and Accessible Only to Privileged Users: A New Ironsphere Solution Brief
By: Ali Gomulu
Today we introduced our latest solution brief, illustrating how Ironsphere ensures control and protection of Microsoft servers, with privileged access security capabilities based on a man-in-the-middle architecture to prevent credential theft of super-user accounts.
Our easy to implement and use, and extremely cost-efficient solution also ensures our customers’ Microsoft servers are used only for legitimate business purposes.
Direct Access refers to the accidental or intentional access attempts from users’ computers to remote hosts/servers directly, instead of going through Ironsphere.
Privileged user direct access management can be approached in 4 different ways:
- Changing the owner of the privileged credentials (from users to Ironsphere)
- Blocking direct access at the network level
- Detecting and responding to direct access attempts
- Deploying Access Control Agents on Hosts/Servers
These options can be used individually or combined in a single deployment. This decision will be primarily driven by the nature of the infrastructure and the desired level of control/security.
Ironsphere is the fastest to deploy PAM solution in the market due to its agentless man-in-the-middle architecture.
Our recommended approach is to isolate all privileged sessions and establish them through Ironsphere, eliminating user direct access to remote hosts/servers. If an organization has special edge cases or exceptional use cases, where direct access of privileged users cannot be monitored or eliminated, Ironsphere Access Control Agents can be deployed as a complementary capability to centrally manage privileged user direct access.
You may download the Direct Access Management for Microsoft servers solution brief here.
As Attacks on Infrastructure Continue to Intensify, Cyber Security Leaders Call for Further Investment
This past week Colonial Pipeline company, which operates a pipeline that carries gasoline, diesel fuel, and natural gas along a 5,500-mile path from Texas to New Jersey, was forced to take itself offline after being attacked by a criminal cyber gang. The Colonial Pipeline, which carries 2.5 million barrels a day, nearly 50% of the East Coast supply of diesel, gasoline, and jet fuel, is still working to restore service and gain access to its systems after the malicious cyberattack while its four mainlines remain offline.
As Infrastructure Week Begins in the US, A Massive Ransomware Attack Drives the US Government to Enact Emergency Legislation
The US government issued emergency legislation earlier this week after the largest fuel pipeline in the US was hit by a ransomware cyberattack.
Buy it Wholesale, Sell it Retail: How MSPs and MSSPs can Benefit from Multitenancy Cyber Security Solutions
Managed Service Providers (MSPs) and Managed Security Service Provider (MSSPs) have a stressful job. They must provide cybersecurity solutions to their clients, protecting them from a broad and growing range of threats, and ensure their customers’ networks, equipment, data, systems, people, and reputations are insulated from malicious forces.