Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

  • LANGUAGE: English DATE: Thursday, June 22, 2017 TIME: 4:00pm CEST, 3:00pm BST, 10:00am ET, 7:00am PT
Upcoming Webinars
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.

But what if instead of scrupulously designing access policies and rigorously monitoring every privileged account’s activities to prevent a malicious user from misusing their privileges one could stop giving anyone privileged access at all? Why delegate access to a sensitive system when you can delegate a specific task? This approach would work best for helpdesk staff, external contractors or outsourced IT administrators – in other words, for anyone who must handle repetitive and mundane maintenance tasks across endpoints, servers, devices, and applications.

By providing out-of-the-box automation for common administrative workflows, such a Privileged Task Management solution would dramatically reduce the risk of privilege misuse or cyber-attack, since there are no longer any privileged sessions to manage and monitor. It would also provide substantial cost and time reduction for helpdesk calls, equipment maintenance and other IT tasks which can be performed more efficiently with automation.

In this KuppingerCole webinar, you will learn about:

  • Current status and the latest trends of the Privileged Access Management solution market;
  • Operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
  • Turning any business process into a pre-packaged workflow, no IT experience or privileged access required.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.

In the second part, Andy Harris, Engineering Director at Osirium, will describe the Privileged Task Management approach in detail and explains what kinds of tasks lend themselves to delegation. Furthermore, he talks about how they can handle input parameters and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.


Andy has over 25 years’ experience inventing and building unique IT networking and security products. In a long and distinguished career including being Technical Director at Integralis Andy has invented many leading-edge technologies including IP Network Translation Gateway, Print...

Lead Sponsor

Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.

The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.

Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.

Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.

Watch now


Trending Videos

Next Webinar


Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00