October 21st, 2009
Through the installation of rogue software applications, to the privilege elevation of malware, a lack of oversight on administrative rights is undermining our best efforts to protect the enterprise. With increased audit scrutiny on administrative access, this problem has recently been brought to the forefront. How do you properly manage the rights of your infrastructure administrators? What about those end users that need “special privileges?”