Sunday, January 15, 2012

Novell: Prerogative user is not safety of enterprise of controlled visit menace

[dispatch of Sai Di net] not long ago has a report to say, korea is to cause the network that the United States and government office of Korea number homemaking and company website break down to atttack wire-puller. What this makes the computer since the mind hover of people safe again is ghostliness, cause industry leader people to weakness of oneself data center anxious.



This is not to say average company should begin care is thought of come from make trouble national attack, but real danger exists really, and leave what your distance may compare average person to imagine want to be gotten nearly much. Actually, this kind of menace may be beside you.



Research makes clear by currently hold the post ofor the safe problem with predecessor derivative employee, no matter be intended,still be innocently, want to compare the attack menace that comes from any tripartite to cause belongings and financial loss more likely. For example, an investigation that be made by place of Ponemon Institute LLC recently and releases by American Networking World shows, about getting the air a few data of the manner of personnel and behavior are worth vigilance.



What this investigation involves 945 to ever dismissed come off sentry duty or resignation in 12 months in the past is individual. Investigation shows, 59% admit ever theft company data, information of secret of the 67% units before Ceng Li is used in order to win new job. This investigation company discovers, have the philtrum of allergy mood to the company, 61% Ceng Touna count are occupied. These people come from nearly 24 perpendicular industries, be like manufacturing industry, hygiene, education and government sector. canon ef 15mm



A few people admit, they know be a mistake to obtain company information secretly, but the philtrum that passes data in Ceng Touna, 79% gave out all sorts of different accounts, some saying that those information may be in useful in the future, some giving out such as " others is so dry also " and " the company won't recover these information to me " the view of and so on.



Make the report of place by FBI and PricewaterhouseCoopers according to another not long ago, the safe problem of 80% is occurrent, having 20% only is in cold blood. This report points out, the average cost of an in-house and safe problem is 2.7 million dollar, and external it is 50 thousand dollar.



Those who make a person very open-eyed is, in the investigation of Ponemon Institute, the tube-shaped part of gets the employer before the person that visit says they still can be visited after leave computer science department of 24% , the person that exceeds 50% among them is in leave 1 day to arrive the 1 visit inside week still feasible, the person of 20% visits authority continuance to exceed 1 week of above.



   Adopt correct safety precaution to close back door



Although people thinks the method of nonexistent no risk at all can prevent documentation and electronic data generally by pilfer, but still having a lot of measure companies can be used, also practicable technology carries out company data to protect the politic, happening that prevents a lot of problems.



To the company that just started, a lot of companies do not have necessarily will super user or root account qualification to ex the best selling dog crates largepose need to run user of high level jussive, and in administrator the password after fluctuant job often also does not revis dog crates large dogs e the back door that this potential ground left – to enter a system, raised the possibility that safe question happens and abuses.



In today's company, put in the need of more close together to prerogative user pilot with massive move. Offer controlled super user visit through be an administrator, make they can carry out their job alre dog crates large best buy ady, do not need to visit prerogative account qualification needlessly again at the same time, administrator letting IT can manage the identity of super user and root account and visit, this is very pressing. Additional, any adding up to compasses a crucial component of the solution is to want to be able to define the user visit to the system not only, and how is tracking a visit even used, the mobile log that crosses much platform centralizedly because of this one also is epochmaking.



Running UNIX and Linux system surely is a challenge that the administrator faces already, and the increase sharply of the data center amount that runs below a variety of operating systems and hardware platform also makes this issue more complex more control hard. Although be in in the past a certain number of a lot of products that manage in the light of password control and identity ever also appeared in year, but be in at present, more senior identity management and visit control solution still are demand key.



Because realize these problems, asset was in the technology that Novell bought Fortefi to roll out new Novell Privileged User Manager subsequently, can cross much system to undertake commission, grain shape visit is controlled and " super " with " " the audit of user attributive, include UNIX and Linux environment among them.



   Novell Privijeged User Manager seals a back door for you



Actually, the order that it allows data manager to be able to define prerogative user to be able to be carried out on any UNIX or Linux platform centrally, ensure prerogative user is only executable specific task. This kind entrusted management to remove the issue that allocates root account qualification administr dog stairs best buy ator, lowermost rate reduced the potential risk of the enterprise. The technology with distinctive Novell makes management gets simplifying, dog to make sure with audit behavior closes continuously compasses.



Through entrusting visit root attributive, provide the mobile daily record of the collect Chinese style that crosses UNIX/Linux to mix an environment, super User Privilege Management (SUPM) the risk that the system makes be not accredit to trade to be visited with information falls to lowermost rate. This makes the order that the administrator can execute according to wanting, executive person, executive time still has executive place even, relaxed configuration is dvd discovery 4 regular, the lock decides user attributive. Account entrusted character to eliminate gift on aleatoric system the need that root account convention visits authority.



Censorial legislation also brings the demand that increases ceaselessly to the enterprise, the enterprise needs to safeguard a system to trade with user activity audit accounts index. What a lot of other SUPM application offer is data of original daily record, handiwork of need audit staff is collected and still filter thousands of record. The processing process that this kind of handmade makes mistake easily increased to run cost, make the enterprise is exposed in safe risk, examine personnel to omit the event that makes serious menace to the enterprise likely, whether does because this is indemonstrable also,audit close compasses.



ata pci

To reduce the complexity of audit process, the Compliance Auditor part in Novell Privileged User Manager is offerred automatic data filters ability, will identify and dog high risk incident. In showing the user interface that changes in direct figure about information, make manager peo dog stairs for bed ple can examine safety to trade with audit staff, time put user activity and punish incident record. This interface still can undertake even custom-built, will assess the potential risk of user activity and systematic incident, allocate appropriate risk level for unusual activity next first to answering eduction order.



Any safe solutions should need around the safety of the enterprise, undertake through setting regulation of much platform trade compose is built. Have in modular processing is centered to attributive is controlled and add up to compasses audit in the structure the ability that each respects work is very important, modular the structure can be adjusted patulous in order to get used to any enterprises. Satisfy the spirit of censorial authorities not only, and the technology that the condition of contented and optimum safe solution can ensure the enterprise is safe by the most effective most economic ground is managing.



   Use active and safe method to reduce cost, complex spend zephyr danger



Account is shared, attributive leakage and ask duty be short of breaking is by reaction mechanism time and again often the common problem of refer. Novell uses distinctive method, the user attributive management and active audit work shed union to be together, make the enterprise can be carried out quickly controlled assessment, risk classifications and user accredit handles a process. Use those who pass central console accredit to entrust visit attributive, a certain user can allow moving prerogative command, and all activities are written down enter a daily record.



Through helping a company super user manages quick disposition and be in an enterprise dog inside whole range, the state restriction that Novell Privileged User Manager feels company easy damage trades in blame accredit and in information visit, its are as a result: The enterprise can be reduced the cost related to super user attributive and visit management, complex spend zephyr danger.



It still makes the user can define regulation, according to name of user name, the command that key in, leader and time (He Ren, why thing, He De and when) aleatoric combination, allow or decline user activity.



Through managing UNIX and Linux attributive with this kind of means, controallable user classics accredit can run what command with where in w most popular selling dog crates large hen. In all activities are reported in powerful audit by the record and managing a tool, make the enterprise can take instant action when questionable activity happens.



Get demonstrative in the attack that prerogative user visits administrative importance to be in more and more is opposite to be worth a system at high price. Contingency that happen in Fang Limei recently are outstanding showed tighter control and the value that examine better to prerogative user activity. According to press, a of this banking giant contract work that is dismissed is accused embedded of all data on the 4000 computers server that company of an appetent destruction spreads all over the whole nation make trouble script. After dvd discovery best buy he is dismissed, his server attributive was not stopped.



In this case, that script discovers through accidental interpose, but this accident makes clear, ne dvd discovery channel ed has tighter control to prerogative user.



Author: Lilin

No comments:

Post a Comment