Oct 29 · 3 min read
The story of how a large government agency eliminated admin privileges on endpoints and implemented on-demand application elevation using Securden in less than 60 minutes after struggling for over two weeks even to get started with competing vendors.
Enterprise IT management is inherently complex. IT managers perform the unenviable task of securely managing their infrastructure. Looking for solutions to specific pain-points, they turn to IT management software from various vendors. In most cases, while solving particular problems, the IT management software, in turn, introduces additional complexities and challenges to the already burdened IT team.
Enterprise IT vendors follow Ohm's law: the pricing of a product is directly proportional to the software’s complexity. As a result, they wish to create an illusion of complexity and operate around that. The process of obtaining the solution, deploying, and running all depends on high-touch consultancy services. They package a massive list of features, which the teams would hardly use. They charge a super-premium price.
But the harsh truth is that Enterprise IT management software can be devoid of all complexities and be simple, intuitive, and straightforward. It can ease the burden of IT managers instead of creating complexities.
This is exactly what we have successfully achieved at Securden.
A few weeks ago, we got an evaluation inquiry from one of the USA’s most prominent government agencies. Their requirement was to manage permissions on endpoints effectively. The end-users don’t have administrator privileges. The users approached the internal IT help desk for various needs like software installation, running specific programs, etc. The help desk found it challenging to manage a growing number of such requests. The process and the delay were creating frustration for users.
The government agency was looking for a solution that would allow end-users to run approved software seamlessly and elevate new applications on-demand with complete controls, monitoring, and audits.
The service desk team shortlisted three vendors for a PoC - Securden and two others.
Soon after receiving their request for a PoC, we sent all details required for an evaluation by email first. About 60 minutes later, our presales engineer called the IT services support specialist in charge of the assessment. He aimed to have a preliminary discussion for a PoC with them.
Surprisingly, the IT services support specialist at the other end conveyed that he had already completed the PoC! He had deployed the solution on an internal server, pushed agents on endpoints, discovered the applications running on those machines, created application control policies, and even tested from a few endpoints - ALL WITHIN 60 MINUTES, without any sort of assistance from our side.
“Securden Endpoint Privilege Manager was pretty straightforward. It was simply like click, click, click … and I was all set” -- these were very words the support services specialist told our presales.
He also revealed that he was working with the other two vendors for over two weeks, yet the PoC had not even started. The deployment required several prerequisites.
The other two vendors are reputed players. They have been in the market for a long time. Their products, without a doubt, are good. Unfortunately, they carry the legacy burden that makes enterprise IT complicated, expensive, and disjointed besides forcing organizations to endlessly rely on consultancy services. They create an impression that complexity means superiority and thereby attach a hefty price tag.
While it is not possible to entirely remove IT management’s complexity, organizations can certainly avoid complicated software. We, at Securden, strive to make IT management fun through point-and-click simplicity. We don’t create a false impression of ‘complex-superiority.’ Instead, we take pride in simplifying things and prevent customers from being ripped off.
If you are struggling with privileged access management (PAM) issues, take a look at Securden suite of products - Password Vault for Enterprises, Privileged Access Manager and Endpoint Privilege Manager. You will be up and running in 30 minutes!
Endpoint Privilege Management: Filling the gaps in Intune (Part 2)
Intune EPM (Now Microsoft Entra) helps organizations manage admin rights in a very basic manner ...
Oct 10 · 3 min read
Endpoint Privilege Management: The local admin rights dilemma (Part 1)
The debate over giving unrestricted admin rights is a constant struggle between IT staff and ...
Oct 6 · 4 min read
2013 Target Data Breach: 10 Years On, but the Same Threat Pattern Looms Large!
Hackers targeted the low-hanging fruit, launched an unsophisticated attack, and carried out a...
July 25 · 6 min read
Password management best practices: Practice or Pay!
Passwords leaked from data breaches in the past continue to cause ripples in 2023, even amidst...
May 26 · 5 min read
Identity thefts and data breaches - The aftermath of privileged access mismanagement
Cybersecurity is a growing concern for businesses of all sizes, as advanced hackers and cybercriminals...
Dec 27 · 4 min read
Spate of cyberattacks rock the land down under
Lack of API security, exposed credentials, and misuse of privileged access continue to cause harm...
Nov 25 · 4 min read
Make this Thanksgiving a memorable one. Treat yourself to a surprise!
We're planning to make this year's Thanksgiving extra special.
Nov 21 · 2 min read
The Spooky Season is here early! Recent data breaches re-emphasize the significance of password security
As Halloween is dedicated to remembering the martyred, organizations falling victim to data breaches remind us...
Oct 20 · 4 min read
We're at GITEX, Dubai. Come, meet us!
Are you planning to participate in GITEX, Dubai? If yes, this is a great opportunity to meet our product experts and get a ...
Oct 10 · 2 min read
May God defend me from my friends
As stories of trusted insiders causing information security breaches continue to unfold, it’s time organizations woke up to...
Dec 21 · 4 min read
Ransomware attack on Colonial Pipeline: Executing cyberattacks, now a child's play!
With the easy availability billions of compromised credentials on the dark web, and the practice of password reuse rampant, hackers...
jun 7 · 5 min read
Eliminating Admin Rights and Controlling Applications (Part 3)
One of the most effective approaches to reducing risks is eliminating the local admin accounts altogether and...
May 17 · 4 min read
Looking for a Passwordstate alternative?
Passwordstate, an enterprise password manager developed by Click Studios, suffered a supply chain attack between...
Apr 30 · 3 min read
Local Admin Accounts Management: Microsoft LAPS Vs. PAM (Part-2)
In the previous post, we dealt with the importance of local admin accounts, the associated security risks, and...
Apr 06 · 3 min read
Top 10 password policy recommendations for sysadmins in 2021
Passwords are omnipresent in our personal and business digital environments. An average person has at least...
Jun 12 · 8 min read
Local Admin Accounts - Security Risks and Best Practices (Part 1)
We are all too familiar with the local administrator account that gets created automatically when installing a Windows...
Mar 19 · 4 min read
Poor password security practices cause massive security breaches
Weak passwords, password reuse, password sharing, hard-coded credentials, lax measures to storing credentials...
Mar 13 · 6 min read