Policy Management
Password policies
To thwart attackers and minimize the risk of a data breach most organisations impose strong password policies on their users. The owners of enterprise passwords are the employees. The issue is often not whether a strong password policy exists but on managing how those employees implement that policy.
Users now having an impossible combination of password rules to remember to access their various business and personal services. Consequently, they are devising their own coping mechanisms to manage that ‘password overload’.
Users write down passwords, re-use the same password across different systems, create variances or use simple and predictable password strategies. As a consequence the employee “perimeter” is now defined by the sum of their business and personal contacts, where passwords are utilized.
Attackers use a variety of social engineering techniques and powerful, automated tools to discover passwords and take advantage of this human behaviour.
Reports now show that organisations today view co-workers not hackers as the greatest threat to security. and employee password practices as the greatest interior threat to an organisation.
The requirement is to find a user friendly way of enforcing the organisations password policies whilst at the same time negating their coping mechanisms.
We provide a integrated set of rules based tools and accompanying consultancy services that block the techniques used by attackers. The benefits include
- Strengthening password policy beyond AD
- Interface to 3rd party data bases of banned or compromised passwords and dictionaries
- Rules based filters to block re-use, password variants etc.
- Interceptor technology to capture and apply policies to any changes made outside self service.
- Visual indicators for ease of use.
- Real time reporting and monitoring.