Virtualization Technology News and Information
Hysolate 2019 Cybersecurity Survey Reveals Overwhelming Need to Isolate Privileged Access
Hysolate, pioneer of secure software-defined endpoints, today revealed results of its 2019 Privileged Access Workstations (PAW) survey. Key findings include that 87 percent of cybersecurity professionals believe separating privileged environments from corporate, internet-exposed environments is highly critical for protecting sensitive information. It also found that time-consuming access processes and the inability to install apps, browse the web or plug in external devices, are key implementation roadblocks. The survey was conducted by Cybersecurity Insiders and queried approximately 200 security professionals. 

"Privileged users are targeted by cyberattackers because they have direct access to an enterprise's crown jewels. The good news, according to the PAW survey, is that the overwhelming majority of enterprises believe protecting these users and data resources is a priority," said Tal Zamir, CEO and co-founder of Hysolate. "However, common methods to secure privileged access, such as using separate workstations or jump hosts, often have an adverse effect on user productivity or still allow attackers to gain privileged access. Enterprises clearly need a way to have trusted privileged access without compromising user performance."

According to Neil Macdonald, VP and Distinguished Analyst at Gartner, CISOs should "focus on projects that reduce the most amount of risk and have the largest business impact." He said a number 1 priority is to make it harder for attackers to access privileged accounts. 

Highlights of Hysolate's 2019 Privileged Access Workstations Survey

  • Protecting Privileged Environments is Highly Critical - 87 percent of cybersecurity professionals agree that isolating privileged environments from general corporate and internet-exposed environments is highly critical.
  • Nearly 80 Percent of Respondents Have Already or Are Planning to Implement PAW - 42 percent of organizations have completed or are actively implementing additional security measures for privileged users. In addition, 35 percent say doing so is a top 3 priority and are evaluating how to accomplish this.
  • Separate Workstations and Jump Hosts Have Some Adoption - 94 percent of respondents say IT admins are at increased risk of compromise if they use the same device to connect to sensitive/privileged assets and their corporate, internet-exposed network. This may explain why, according to the survey, 35 percent have implemented PAW using separate physical devices, and 50 percent use jump hosts/jump servers to protect access to privileged network resources.
  • Privileged Users Are Concerned about Complexities and Productivity Loss - Many privileged users are frustrated by the limitations imposed by existing security measures. 51 percent cite cumbersome, time-consuming processes for accessing privileged resources, while 40 percent complain that they can't install apps or browse the web freely. More than a third take issue with not being able to plug in external devices (39 percent) or get files from third parties (34 percent).
  • PAW Challenges Impede Adoption - 33 percent of organizations are considering implementing some form of PAW but have no clear timeline, while 16 percent currently have no plans in place.
There are multiple ways to secure access to privileged accounts, including Hysolate's virtual air gap approach that enables multiple segregated environments on the same end-user device. For more information on how cybersecurity professionals view PAW challenges and opportunities, click here to download a free copy of the Hysolate 2019 Privileged Access Workstation Survey. Click here for the survey results infographic.
Published Thursday, February 28, 2019 9:39 AM by David Marshall
Filed under: ,
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
<February 2019>