Centrify Privilege Elevation Service
Over the past few years, it’s become evident that attackers are no longer “hacking” in for data breaches: they are simply logging in using weak, stolen, or otherwise compromised privileged credentials. Once they are in, they take advantage of the fact that many organizations assign too much privilege to their administrative users. This allows hackers to spread out and move laterally across the network, hunting for further privileged accounts and credentials that help them gain privileged access to an organization’s most critical infrastructure and sensitive data. Zero Trust Privilege mandates to grant just enough, and just-in-time privilege to limit lateral movement across the network. The Centrify Privilege Elevation Service data sheet outlines how the service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege.