State-of-the-Art Privilege Management by Design
- LANGUAGE: English DATE: Thursday, October 06, 2016 TIME: 11:00am CEST
The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.
Therefore, Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on servers and workstation alike gets more and more important. Applying a risk-based approach for controlling critical access helps putting the focus on sensitive privileges. And understanding typical admin behaviour as well as identifying undesirable actions can assist you in adapting your Privilege Management strategy as threat patterns change.
In this KuppingerCole Webinar, you will hear about:
- Mitigating external and internal threats effectively by injecting administrative security right from the start into the network design
- Creating resilient, fortified, intelligent and proactive system designs with the right mix of functionalities
- Applying a risk-based approach for controlling and monitoring critical access
- A multi-functional, integrated solution for moderating the abuse of privileged system accounts and entitlements, on endpoints (Mac, Windows) as well as server systems
- Steps to Complete Privileged Account Management
In the first part of the webinar Matthias Reinwarth, Senior Analyst with KuppingerCole will give an overview of the building blocks of an adequate strategy for privilege management. He will explain that today's solutions for managing administrative accounts need to follow a “security by design”-approach and have to go far beyond traditional password vaults and session management systems.
In the second part Brian Chappell, Director Technical Services EMEAI & APAC at BeyondTrust will explain how these building blocks can be leveraged to transform networks into security infrastructures. He will give insight into real-life deployment scenarios between traditional admin account and session management, endpoint security control and intelligent behavioural analytics.
|BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure.