How are other large enterprises protecting credentials on endpoints (specifically desktops)?

4.1k viewscircle icon5 Comments
Sort by:
Head of ISG in Finance (non-banking)2 years ago

Large enterprises employ a variety of security measures to protect credentials on endpoints, especially desktops, given the critical role they play in daily operations. Here are some common practices:

Endpoint Protection Software:

Utilizing advanced endpoint protection software that includes features like antivirus, anti-malware, and endpoint detection and response (EDR) capabilities. These tools help detect and prevent unauthorized access and malicious activities.

Multi-Factor Authentication (MFA):

Implementing multi-factor authentication to add an extra layer of security. This requires users to provide multiple forms of identification (e.g., password, smart card, fingerprint) before gaining access.

Password Policies:

Enforcing strong password policies that include complexity requirements, regular password changes, and avoiding easily guessable passwords. Using password managers can also enhance security by generating and storing complex passwords.

T&T Specialist in Manufacturing2 years ago

Using the Two factor Authentation, Proper credential protection solution like LAPS, Privilege's management etc. 

IT Manager in Media2 years ago

Large enterprises protect desktop credentials through:

Endpoint protection software
Multi-Factor Authentication (MFA)
Encryption
Regular software updates
Privileged Access Management (PAM)
Security awareness training
Endpoint Detection and Response (EDR)
Group policies and access controls

Manager, Cybersecurity in Travel and Hospitality2 years ago

Multi-factor authentication is our go to solution in achieving end point protection. However we have implemented password complexity according to NIST 800-53 and regularly enforcing system updates and deployed crowdstrike falcon, AV solutions.

Information Security Analyst in Manufacturing2 years ago

We use minimum 14 character strong passwords with no admin rights granted to end users in their normal account. All administrative accounts are rotated nightly and require multi factor authentication.

Content you might like

It's repetitive (boring)23%

It's unscalable (time-consuming, labor-intensive)47%

Hard to get cooperation from core teams (ungrateful, unpopular)28%

Other (please comment)

View Results

90 Days15%

365 Days47%

3 years24%

5 years9%

7 years6%

Other (share in the comments)

View Results