Rehbock joins Magix

August 2010 News & Events

There are many reasons for ignoring the management of privileged identities in business today including the failure to change default and initial login credentials for new hardware and software, to overlapping functions and responsibilities as a result of cost cutting. And then there’s the infamous failure to update someone’s access when they change jobs or to remove it completely when they leave. Arguably, the most unforgivable privileged identity sin is allowing weak access controls that are easily broken by social engineering.

Uncontrolled privileged access can pose serious risks of unwanted data access and loss, as well as disruptions in services. There is, however, a proven four-step process to ensuring the organisation’s privileged identities remain secure and well managed.

1. Identify: Identify and document all critical IT assets, their privileged accounts and interdependencies. This process can be done manually, with the associated risks, or by automated privileged identity management software. The automated approach reduces the risks and costs, while optimising the efficiency of the data collection process without human errors creeping in.

2. Delegate: Once a comprehensive list of assets and dependencies exists, a process needs to be followed to securely and efficiently assign time-managed access privileges to the relevant authorised personnel. Automating this step reduces risk and delivers privileged credentials over a secure communications channel without exposing passwords or falling prey to human error.

3. Enforce: Companies must enforce rules for password complexity, diversity and change frequency, synchronising changes across all dependencies to prevent service disruptions. Once again, automating this process is recommended to force the appropriate changes at the appropriate times.

4. Audit: The final step in ensuring securing privileged identities is ensuring that all security access or change requests, their purpose and durations are documented, and that management is made aware of unusual events. This documentation must be audited regularly to pick up anomalies. Automated privileged identity management software again provides powerful protection and features that give management better control and accountability over systems and processes.

Effective identity and access management (IAM) across the board is a crucial area business today needs to focus on. As part of this process, companies also need to pay special attention to privileged identity management processes to ensure they strictly manage access to the most sensitive areas of their infrastructure.

For more information contact Alan Rehbock, Magix Security, +27 (0)11 258 4442, alan@magix.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.