Why Managing Privileged Users Benefits your Business
- LANGUAGE: English DATE: Tuesday, September 27, 2011 TIME: 12:00 CEST
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
With the two most critical assets in any organization being the employees and the information which resides in the company, getting the right alignment between the workers and the information which they are allowed to access has always been a critical requirement. However, an often overlooked group of users are those privileged users who need to manage the systems where this information resides and who often use anonymous, shared or system accounts to access the infrastructure providing them, either intentionally or not, with access to any company resource and the corresponding business sensitive information.
Compliance requirements dictate that this privileged user access is managed and that separation of duty conflicts are controlled, yet 10% of IT professionals state that they can still access system at previous job and as many as 41% admit that they share account names and passwords.
Privileged User Management provides your business a simple solution to ensuring company assets remaining accessible only to those who need them, and to ensuring you can control and monitor the way your outsourcers, contractors and permanent privileged users have efficient and secure access to the systems they manage.
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software´s Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Some of the key topics Martin and Phil will talk about in this webinar:
- What are the challenges solved by privileged user management?
- How to efficiently manage privileged identities across UNIX, Linux, Windows and virtual servers
- The relationship between privileged users and privileged account management
- How to meet ISO 27001 requirements with your privileged user management
- Managing privileged identities in the cloud
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!