Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
REDWOOD CITY, Calif., May 31, 2022
New Conversational Geek eBook provides best practices to protect servers from cyberattacks
REDWOOD CITY, Calif., May 31, 2022 /PRNewswire/ -- Delinea, a leading provider of privileged access management (PAM) solutions for seamless security, today debuted, "Conversational Server Access Security," a new digital guide to help organizations secure hybrid infrastructure from cyberattacks. Published with Conversational Geek, the complimentary eBook shows how to take a Zero Trust approach to comply with the Principle of Least Privilege and reduce risk.
Servers sit at the heart of IT infrastructure and are frequently targeted by cybercriminals looking to exploit weaknesses in Windows, UNIX, and Linux servers residing both on-premise and in the cloud. By targeting servers, cybercriminals can gain privileged access to critical data including financials, intellectual property, and more—opening the door to system-wide data loss, ransomware, and worse.
Delinea's introductory guide to server access security outlines how layering access security controls directly on servers can verify that anyone with a privileged credential has the required permissions at every access point. This is reinforced by adopting a Zero Trust mindset to cybersecurity founded on the Principle of Least Privilege, granting access to server resources only to proven identities with the right entitlements, when they need them, and for just the amount of time needed to complete the task. Then those privileges should be removed so they are not left open for exploitation.
"The concepts of Zero Trust and least privilege are not new, but many IT and security professionals are unclear about how to apply them in rapidly-changing, more complex hybrid environments," said Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea. "This new resource can help anyone get a better understanding of how to secure access to on-premises and cloud servers and take actionable steps to avoid becoming the next victim of cybercrime targeting modern infrastructure."
The best practices outlined in the eBook help cybersecurity professionals implement a server access security strategy to:
To download a complimentary copy of Delinea's new eBook, "Conversational Server Access Security," visit https://delinea.com/resources/conversational-server-access-security-pdf.
About Delinea
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Learn more about Delinea on LinkedIn, Twitter, and YouTube.
© Delinea Inc. (formerly Centrify Corporation) 2022. Delinea™ is a trademark of Delinea Inc. All other trademarks are property of their respective owners.
Contacts:
Brad Shewmake
Delinea
brad.shewmake@delinea.com
+1-408-625-4191
John Kreuzer
Lumina Communications
delinea@luminapr.com
+1-408-963-6418
View original content to download multimedia:https://www.prnewswire.com/news-releases/delinea-publishes-guide-to-privileged-access-management-for-server-security-301557146.html
SOURCE Delinea
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs