SHARE
Facebook X Pinterest WhatsApp

Security Risks Rise due to Mismanaged User Access: HP

Increased threats to sensitive and confidential workplace data are being created by a lack of control and oversight of privileged users, including database administrators, network engineers and IT security practitioners, according to a new report, entitled “The Insecurity of Privileged Users.” The study, sponsored by Hewlett-Packard and conducted by the Ponemon Institute, revealed that 52 […]

Written By
thumbnail
Nathan Eddy
Nathan Eddy
Dec 13, 2011
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Increased threats to
sensitive and confidential workplace data are being created by a lack of
control and oversight of privileged users, including database administrators,
network engineers and IT security practitioners, according to a new report,
entitled “The Insecurity of Privileged Users.”

The study, sponsored by Hewlett-Packard
and conducted by the Ponemon Institute, revealed that 52 percent of
respondents are at least likely to be provided with access to restricted,
confidential information beyond the requirements of their position.

More than 60 percent of the respondents
reported that privileged users access sensitive or confidential data out of
curiosity, not job function, with customer information and general business
data at the highest risk. The most threatened applications included mobile,
social media and business unit specific applications. The global survey focused
on more than 5,000 IT operations and security managers across Australia,
Brazil, Europe, Asia and the United Kingdom and the United States. Many
respondents claimed to have well-defined policies for individuals with
privileged access rights to specific IT systems.

However, almost 40 percent
were unsure about enterprise-wide visibility into specific rights, or whether
those with privileged access rights met compliance policies. Twenty-seven
percent said their organizations use technology-based identity and access
controls to detect the sharing of system administration access rights or
root-level access rights by privileged users, and 24 percent said they combine
technology with process. However, 15 percent admitted access is not really
controlled and 11 percent said they are unable to detect sharing of access
rights.

“This study spotlights risks
that organizations don’t view with the same tenacity as critical patches,
perimeter defense and other security issues, yet it represents a major access
point to sensitive information,” said Tom Reilly, HP’s vice president and
general manager of enterprise security products. “The results clearly emphasize
the need for better access policy management, as well as advanced security
intelligence solutions, such as identity and privileged-user context, to
improve core security monitoring.”

Top barriers to enforcing
privileged-user access rights are the inability to keep pace with change
requests, inconsistent approval processes, high costs of monitoring and
difficulty in validating access changes, the report found, while areas for
improvement included monitoring privileged users’ access when entering
root-level administrative activity, identifying policy violations and enforcing
policies across an entire organization.

The potential for privileged
access abuse varies from country to country based on responses, with France,
Hong Kong and Italy having the greatest potential, and Germany, Japan and
Singapore having the least. Nearly 80 percent of respondents reported that
deploying a security information and event management (SIEM) solution was
critical to governing, managing and controlling privileged-user access rights.

“The intent of the study is
to provide a better understanding of the state of access governance in global
organizations and the likelihood privileged users will abuse or misuse IT
resources,” said Larry Ponemon, the Ponemon Institute’s chairman and founder.
“The findings demonstrate key areas of concern, and clearly identify budget,
identity and access-management technologies, and network-intelligence technologies
as the three most critical success factors for governing, managing and
controlling privileged-user access across the enterprise."

 

Recommended for you...

SentinelOne Debuts Wayfinder Threat Detection and Response Services
Jordan Smith
Nov 6, 2025
NETGEAR’s “Drive” Redefines Partner Success
Cisco Targets Critical Infrastructure Needs for AI Era
Cork Marks Three Years Linking MSPs to SMB Cyber Resilience
Victoria Durgin
Oct 31, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.