sb-au logo
Story image

Centrify targets local admin access on Macs through latest identity management update

19 Jun 2017

Macs in the enterprise are prone to careless administrative account maintenance and passwords are being shared further than they should be, according to Centrify.

According to the company, it is common for organisations to put administrative passwords on Macs and use the same password across all of them. For users who need to install apps, suddenly that password is shared and anyone can gain access.

According to the company, providing local administration rights means that anyone - whether current users, ex-employees, or attackers - have privileged status on Macs.

"This increases your attack surface and makes endpoints an effective target for malware and rogue applications," the company says in a statement.

As a result, the company has tightened up its admin security in the latest update to its Centrify Identity Platform.

The company is targeting administrators who wish to manage local password management for Macs, as well as application management and software distribution. To do this, the company has utilised turnkey integration using the Munki open source solution.

According Centrify's senior director of APAC sales, the latest updates control shared account password management from servers, network devices, Windows and Linux endpoints to Mac.

"At the same time, they simplify Mac application management with Munki support that enables users to install applications without knowing the admin password,” he adds.

Centrify says the local administrator password management works by generating a unique administrator password for each Mac, whether remote machines or those on the corporate network. The admin password is able to be subject to rotation.

Story image
Beware of these six L7 DDoS attacks
As more services are migrating online, DDoS attacks are increasingly shifting away from the network layer, and into the application layer, writes Radware product marketing manager Eyal Arazi.More
Download image
The three essentials of authentication, according to RSA
Pervasiveness, connectivity, and continuity: Without them, you may as well leave your organisation's front door wide open.More
Story image
AWS launches fully-managed fraud detection service
Businesses lose billions of dollars to online fraud every year, however businesses respond by investing in cumbersome fraud management solutions that often rely on hand-coded rules and are difficult to keep up to date.More
Story image
Cyber-attacks thrust IT compliance to the top of the business agenda
If an organisation is running on the cloud, its ecosystem has to be compliant with industry standards and frameworks. Here are some tips on how to ensure compliance processes are fit for purpose.More
Link image
Rapid response: The best way to detect and respond to traffic anomalies
Metadata is a must-have security practice that allows analysts to parse through more devices, more communications and more data in less time.More
Story image
10 cybersecurity risks to consider when transitioning back to the office
According to BSI, working from home (WFH) and working from office (WFO) scenarios should be applied by organisations interchangeably when reopening, with an aim to mitigate potential cybersecurity risks and ensure data privacy regulations are not violated.More