https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Master Agents
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity & Inclusion
  • MSSP Insider
  • MSP 501
    • Back
    • Apply Now
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • Videos
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
    • Channel Educational Series
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
    • Channel Convergence
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Content Resources
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • Excellence in Digital Services
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Master Agents
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity & Inclusion
  • MSSP Insider
  • MSP 501
    • Back
    • Apply Now
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • Videos
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
    • Channel Educational Series
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
    • Channel Convergence
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Content Resources
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • Excellence in Digital Services
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


6 Ways Throttling Privileged Access Can Surge Your MSP Business

  • Written by Channel
  • November 2, 2016
Privileged access management is a growth opportunity. Here are PAM selling points.

Morey HaberAccording to the 2016 Verizon Data Breach Investigations Report, more than 60 percent of attacks on businesses leverage privileged access – the root and administrator accounts most IT teams use daily – often without regard to the risk they represent. Passwords to these accounts are rarely changed; are known by multiple individuals, often including contractors and temporary employees; and are frequently reused on a range of systems, accounts and applications.

MSPs must help customers get a handle on out-of-control credentials.

Privileged access management, or PAM, is the part of identity management focused on administrative or root accounts within the IT infrastructure. PAM is frequently used as a data security and governance tool to help companies meet prevent internal and external data breaches stemming from abuse or misuse of privileged accounts. It’s a key component of vulnerability management – the practice of identifying, classifying, remediating and mitigating vulnerabilities on a continuous basis – and is a fundamental component of many regulatory-compliance initiatives.

Verizon’s DBIR reveals nine areas of vulnerability that partners must address. Download the free report.

It can also help solve seven problems plaguing most customers today.

1. Enabling anytime, anywhere secure access

Companies must be able to control access to data across all devices and environments, including traditional and virtual desktops, servers, databases and applications, Internet of Things devices and tablets and smartphones. With a managed-services offering for privileged access, an administrator or a contractor can authenticate against select assets remotely (or on premises) and provide sessions that are fully documented (session recording and keystroke logging); controlled via a documented workflow and approval process; and restricted based on policies around factors including time/date and location.

2. Auditing and reporting on privileged activity

The ability to record and replay any activity – including mouse actions, keystrokes and user interface screen captures – by privileged accounts across network and cloud environments is essential to mitigating the risks of a data breach and proving compliance. Ensure that your PAM solution allows activity to be attributed to individuals, even when shared accounts are being used.

3. Cycling employee and third-party passwords

Automatic, active password management and rotation and reconciliation, including on cloud-based platforms, are essential for closing password-security gaps across heterogeneous environments. If you have customers with complex needs and mobile workforces, ensure password changes can be performed with or without local agent technology.

4. Securing third-party access

Many recent, high-profile data breaches have occurred due to attacks originating from non-employees. Strengthening the weak link in the security chain – remote access by third-party vendors and contractors – requires controlled network separation and activity monitoring. In fact, MSPs can help mitigate that risk with a focus on clearly defined access levels, secure connection gateways, proxied access, and auditing and recording of third-party sessions.

5. Securing network devices

Chances are a customer is using weak passwords on networking devices, including firewalls, switches and routers. Common problems include:

  • Default or common passwords
  • Shared credentials across multiple devices
  • Excessive password age (due to fear of changing configs or lack of management capabilities)
  • Overly privileged accounts able to make changes to allow exfiltration of data or impact infrastructure availability
  • Outsourced support services where changes in personnel, contracts and tools are outside of IT’s direct control, which could expose credentials to unauthorized individuals

Any one of these could lead to excessive risk. MSPs need to equip client infrastructures with complete control and auditing of privileged accounts, including shared administrative, application, local administrative, service, database, cloud and social-media accounts, as well as devices and SSH keys.

6. Securing against privilege elevation

Employees, regardless of role, need elevated permissions from time to time. Maybe it’s for installing new software, troubleshooting a problem or running an essential application. Partners can minimize the need to have privileged credentials widely available by performing tasks that require admin access. Also consider a managed service providing auditing for any and all applications that need privileged access. This lowers the risk from hacking techniques, like pass-the-hash, that steal administrative credentials and allows a trusted independent party (the MSP) to monitor and report on all privileged access, regardless of platform.

It’s an increasingly complex world, and the advent of new technologies and IP-enabled devices only increases the chances of a cybersecurity breach. With an MSP helping to minimize the risk around privileged accounts, customer IT staff can spend more time on growing the business and less time on the never-ending process of vulnerability assessment, reporting and patch mitigation.

The more services you can offer to a client, the more you’ll become a part of their daily routine. The more technical roadblocks you can remove, the more likely they will continue to do business with you, recommend you to peers and add new services during periods of growth.

Morey Haber is VP of technology for BeyondTrust. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently oversees solutions for both vulnerability and privileged account management. In 2004, Mr. Haber joined eEye as the director of security engineering. There, he was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients.

Tags: Agents Cloud IoT Regulation & Compliance Security

Related


  • Convergence
    New, Changing Partner Programs: HPE, Zoom, Fortinet, Microsoft, More
    Telecom and IT vendors are courting partners to sell their solutions.
  • Judge and Gavel
    Judge: Charter Must Pay Windstream $19 Million for 'Egregious,' Deceptive Mailer
    The judge said Charter "intentionally and wrongfully" interfered with Windstream's customer contracts and good will.
  • Business handshake
    Ujet, Peerless Network Enter Master Agent Agreements with PlanetOne, Intelisys
    Ujet’s channel partner program supports strategic business partnerships, master agents and integrators.
  • Channel Chief Nameplate
    AT&T, Telarus, MicroCorp Vet to Lead RSI's Channel
    The MSSP entered the channel in early 2019.

One comment

  1. Avatar Kayleigh February 20, 2018 @ 6:17 am
    Reply

    Hey, Morey, great article!

    Security threat, should indeed, be one of the foremost worries of every owner and manager who deals with technology and the internet when it comes to their businesses. and, just like what you have said, most don’t really think about this until it’s too late and a breach, with possible information leak, has finally happened and they are scrambling to mitigate the situation without losing trust from their clients.

    One way of avoiding this is having set processes when it comes to dealing and handling your clients’ sensitive information just like this one here: https://www.process.st/processes-for-it-msps/ and having all of it thoroughly documented on every aspect. 🙂

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • AireSpring Partners Get Additional Support from Axis, Star2Star, TPx Vets
  • The CF List: 20 Top UCaaS Providers You Should Know
  • SMBs Weigh 5G Impact as Verizon, AWS Launch New Use Cases
  • Windstream Enterprise Unveils OfficeSuite UC Contact Center Enhancements

Galleries

View all

M&A Roundup: Tech Data, RingCentral, Telarus, Datto, More

April 20, 2021

Industry Perspectives

View all

Annual MSP Benchmark Survey Reveals Remote Work Still a Top Challenge

April 20, 2021

Why Digital Transformation Is the ‘Invisible Hand’ of Our Time

April 19, 2021

SD-WAN Supports More Purposeful Shift to Cloud

April 16, 2021

Webinars

View all

What to Look For: 2021 Threat Report

April 22, 2021

Health Care and SD-WAN: A Seller’s Guide

April 27, 2021

How MSPs Can Leverage SOCaaS to Improve Security & Grow Revenue

May 4, 2021

White Papers

View all

Hacker Personas: A Deeper Look into Cybercrime

April 20, 2021

Carbonite Data Protection and Cyber Resilience

April 15, 2021

Top Tips: How Resellers Can Leverage Rackspace to Enhance Customer’s Cyber Security Protection with Microsoft 365 Security

March 30, 2021

Upcoming Events

View all

MSP Summit

November 1, 2021 - November 2, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Channel Evolution Europe

November 30, 2021 - December 1, 2021

Videos and Fastchats

View all

5 Reasons Diversity, Equity and Inclusion Is Important

Five9 Shares Insights on Implementing a DE&I Strategy

April 13, 2021

FASTCHAT: How Fortinet Reduces Complexity Through Networking, Security

March 31, 2021

Strong Customer Experience Needs Strong Partner Experience

December 22, 2020

Twitter

ChannelFutures

.@OtavaLLC unveils #partnerprogram enhancements. #cloud dlvr.it/Ry4g4t https://t.co/D9dUuezdn9

April 20, 2021
ChannelFutures

#MSP business is still strong & growing @KaseyaCorp 2021 benchmark survey #digitaltransformation #remotework… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

Our M&A roundup includes massive @Synnex-@Tech_Data merger, @McAfee's enterprise unit sale and @Telarus' acquisitio… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

Join the Allies of the Channel Council, Xposure Inclusion & Diversity Council, and @AllianceofCW on Thursday at 2 p… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

.@salesforce revives Data Recovery Service it retired last year as @AvePoint launches #Salesforce #CloudBackup.… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

.@channelsmart looks back at when she first became aware that diversity was an issue in the channel & forward to wh… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

Why apply to the #MSP501? Hear it from a 2020 winner "...Most importantly, everyone likes to receive recognition fo… twitter.com/i/web/status/1…

April 20, 2021
ChannelFutures

.@TPx_Partners hires @Keysight, Ixia vet as chief revenue officer. #SDWAN dlvr.it/Ry4G8C https://t.co/bGgYVk3CPH

April 20, 2021

MSSP Insider

Business advice for MSSPs and news from the broader security channel.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X