Security Breaches in Authorized Access

April 15, 2011

Security breaches continually occur in spite of the heavy fortification of enterprise perimeters and tight control in user access. Findings would show that majority of documented breaches are committed by internal and external users having authorized access to the system. These users were able to circumvent internal security measures to leapfrog to unauthorized areas when they were only allowed to access a specific area of the network. Controls for privileged users have been dispersed and inadequate.

Xceedium is a network appliance that provides an easy way for companies to create and enforce a granular access policy for highly skilled privileged users. Since all privileged user activities and events are tracked effectively, they cannot easily exploit known holes in Linux and other applications.