Controlling the Insider Threat

In today’s Enterprise IT environments more than ever, ensuring your applications are secure from attack is critical to preventing system outages, thwarting theft of critical information, as well as to sustaining ongoing operations and revenue. Most commonly, the efforts to secure these critical applications are focused on an outside attack, such as hacking into the IT infrastructure, versus from personnel on the inside, who already have some level of authorized access to these applications and their information. As has been proven over the last several years, the risk of the “insider threat” can be just as dangerous as a malicious group of hackers coming from outside of one’s own organization.

In order to provide a comprehensive approach to securing one’s IT environment, it is equally important to secure your IT environment from the inside, and to manage access by personnel, including full visibility and auditability, to know who is doing what. In many organizations, in order to empower staff to perform very basic operational tasks, even Tier 1 support personnel are commonly given some level of “privileged access”, very often at the risk of broad exposure to those systems and applications. However, to restrict any access at all would require that the full burden of all those operational tasks be performed by a small number of more senior, “trusted” staff, which would result in inefficient operations, and effectively not really eliminate the insider threat.

How JumpSoft Helps

JumpCenter provides a systematic way to tighten controls and policies for “privileged users”, or staff members with high-level access, as well as it reduces the need to grant open and direct server access broadly to staff. Additionally, it provides a centralized audit trail of access and actions taken within JumpCenter by all users. JumpCenter provides a platform that empowers staff through a secure interface, only enabling them to perform the discrete functions that are truly required within desired applications and environments to optimize operational efficiency, while enhancing the security model. This includes:

  • Managing discrete application visibility and access to only the appropriate personnel
  • Controlling access by functional or organizational roles, such as production, staging, testing, and development environments
  • Enabling secure, restricted access into applications, eliminating the risk of providing direct, or root access to operational personnel, and instead providing a secure, push-button interface
  • Exposing and enforcing only specific operations to a given user/user group, driven by operational state of a given application, as well as its unique environment
  • Logging every action by all JumpCenter users to deliver full accounting and tracking
  • Providing top-down visibility via a centralized interface to quickly identify which users can access any and all applications and environments
Write a comment:


Your email address will not be published.