Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.
Language: English • Duration: 19:10 • Resolution: 1280x720
Enabling the Digital Business with Identity for the Internet of Things
European Hosted Hybrid IaaS Cloud
Securing your IaaS Cloud
Keyless Biometric Authentication
Making IAM agile and working to the business
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity