Why Managing Privileged Users Benefits your Business
- LANGUAGE: English DATE: Tuesday, September 27, 2011 TIME: 12:00 CEST
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
With the two most critical assets in any organization being the employees and the information which resides in the company, getting the right alignment between the workers and the information which they are allowed to access has always been a critical requirement. However, an often overlooked group of users are those privileged users who need to manage the systems where this information resides and who often use anonymous, shared or system accounts to access the infrastructure providing them, either intentionally or not, with access to any company resource and the corresponding business sensitive information.
Compliance requirements dictate that this privileged user access is managed and that separation of duty conflicts are controlled, yet 10% of IT professionals state that they can still access system at previous job and as many as 41% admit that they share account names and passwords.
Privileged User Management provides your business a simple solution to ensuring company assets remaining accessible only to those who need them, and to ensuring you can control and monitor the way your outsourcers, contractors and permanent privileged users have efficient and secure access to the systems they manage.
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software´s Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Some of the key topics Martin and Phil will talk about in this webinar:
- What are the challenges solved by privileged user management?
- How to efficiently manage privileged identities across UNIX, Linux, Windows and virtual servers
- The relationship between privileged users and privileged account management
- How to meet ISO 27001 requirements with your privileged user management
- Managing privileged identities in the cloud
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.