Controlling and monitoring administrative access to enterprise IT
- LANGUAGE: English DATE: Thursday, June 25, 2015 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Full insight into the administration and maintenance of critical systems is essential for proving compliance to regulatory requirements, but also for protecting an organization’s core business.
It is essential to prevent illegitimate access from outside cyber attackers and from insiders. And it is essential to have the right administrators have access to the right systems at the right time.
Well-defined processes for day-to-day access to any type of critical system include justified access requests, approval processes by system owners and/or line management and secure management of system access, including management of user ids, passwords or SSH keys
But appropriate measures for privileged user management have to go beyond that: Every administrative user session bears the risks of accidental errors, but also of intentional fraud, espionage or sabotage, leading to disruption of service, damage to the organization’s reputation, data leakage or loss of money or assets.
This webinar gives an overview of privileged session management, including
- Administrator credentials management
- Privileged system access request and approval
- Surveillance and live monitoring of administrative sessions
- Different types of session recording
- Rule-based real-time analytics of administrative sessions
- Archiving of administrative sessions for audit and analysis purposes
In the first part of this webinar Matthias Reinwarth, Senior Analyst at KuppingerCole, will talk about requirements and benefits of privileged session management in the legal and regulatory contexts, and beyond.
In the second part Chris Pace, Head of Product Marketing at WALLIX will provide a deeper insight into today’s approaches for privileged session management based on practical experiences, focusing on solutions for large customer environments and multi-tenant cloud service providers.
A software company providing cybersecurity solutions, WALLIX is the European specialist in Identity and Access Security Solutions. WALLIX's unified solutions portfolio enables companies to respond to today's data protection challenges. WALLIX solutions guarantee detection of and resilience to cyberattacks, which enables business continuity. The solutions also ensure compliance with regulatory requirements regarding access to IT infrastructures and critical data. The portfolio of unified solutions is distributed through a network of more than 180 resellers and integrators worldwide. Listed on the Euronext (ALLIX), WALLIX supports more than 1,300 organizations in securing their digital transformation. WALLIX is a founding member of the HEXATRUST group and has been included in the Futur40, the first ranking of growth companies on the stock exchange published by Forbes France and is part of the Tech 40 index.
Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.