There are many security challenges that confront us as we strive to protect our
IT environments. It’s difficult to stay on top of all these challenges, but there are a few steps we can easily take to increase our overall security posture.

1. People who use privilege are anonymous – and therefore invisible
2. The correct use of privilege is done just in time – but accounts are always on
3. Privilege needs systems to create friction – not remove it
4. Automated lock down of privilege – the key to your success
5. Every other security control you have is meaningless if you don’t protect the method to bypass – and even shut down – all your controls

Read more HERE
If you want more tips on managing privilege, read the Lieberman Software white paper Best Practices in Privileged Identity Management


You can also get news about IT-security sent directly to your inbox – via our e-newsletter News2You.
News2You is targeted to both resellers and end users – and contains the latest within IT-security and Networking solutions – as well as invitations to seminars and other events we host.

Do you wish to receive News2You in the future, please send os an e-mail to