Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management

  • LANGUAGE: English DATE: Wednesday, June 27, 2018 TIME: 11:00 am CEST, 10:00 am BST
Upcoming Webinars
Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management

Privilege Management has been a key element of both IAM (Identity & Access Management) and cybersecurity programs for years. However, increased complexity of modern corporate IT infrastructures and mounting pressure from compliance regulators force privilege management solutions to constantly expand their scope into new functional areas. From simple password vaults to advanced monitoring and behavior analytics to governance and compliance – a modern PxM solution permeates every corner of your enterprise IT infrastructure.

Designing and implementing your privilege management as a fully integrated and intelligently automated platform unifying all your IT assets both on-premises and in the cloud can therefore bring multiple benefits. Beyond the obvious goals like reducing the risk of privilege misuse or cyberattacks, having every privileged activity accounted for, monitored and recorded for posterity provides unique visibility into your most critical assets and leaves a consistent audit trail in full compliance with regulations like ISO-27001 or PCI DSS.

In this KuppingerCole webinar, you will learn about:

  • current status and the latest trends of the Privileged Access Management solution market;
  • operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
  • maintaining full audit trail of every administrative action in compliance with every industry regulation.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.

In the second part, Andy Harris, Engineering Director at Osirium, will talk about the Privileged Task Management approach, explain how monitoring and recording each administrative activity helps your compliance posture, and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.


Speakers

Andy has over 25 years’ experience inventing and building unique IT networking and security products. In a long and distinguished career including being Technical Director at Integralis Andy has invented many leading-edge technologies including IP Network Translation Gateway, Print...


Lead Sponsor

Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.

The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.

Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.

Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Lessons From a Journey Into a Real-World Ransomware Attack

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00