Why Managing Privileged Users Benefits your Business
- LANGUAGE: English DATE: Tuesday, September 27, 2011 TIME: 12:00 CEST
With the two most critical assets in any organization being the employees and the information which resides in the company, getting the right alignment between the workers and the information which they are allowed to access has always been a critical requirement. However, an often overlooked group of users are those privileged users who need to manage the systems where this information resides and who often use anonymous, shared or system accounts to access the infrastructure providing them, either intentionally or not, with access to any company resource and the corresponding business sensitive information.
Compliance requirements dictate that this privileged user access is managed and that separation of duty conflicts are controlled, yet 10% of IT professionals state that they can still access system at previous job and as many as 41% admit that they share account names and passwords.
Privileged User Management provides your business a simple solution to ensuring company assets remaining accessible only to those who need them, and to ensuring you can control and monitor the way your outsourcers, contractors and permanent privileged users have efficient and secure access to the systems they manage.
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software´s Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Some of the key topics Martin and Phil will talk about in this webinar:
- What are the challenges solved by privileged user management?
- How to efficiently manage privileged identities across UNIX, Linux, Windows and virtual servers
- The relationship between privileged users and privileged account management
- How to meet ISO 27001 requirements with your privileged user management
- Managing privileged identities in the cloud
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
With a huge amount of data around, cloud migration is the ideal solution today. A necessary stage in migrating data to the cloud is putting it in order. This is particularly important when it comes to unstructured, so-called dark data: files and documents that are undermanaged (excel files of budget estimates, PDFs containing important patents, Word documents containing personal employee or customer information), in general the data that is not managed in an orderly fashion such as structured database which is easily governed. Usually, this kind of data that tends to be misplaced, misused, abandoned, hacked, or leaked, in the cloud and local server repositories putting enterprises at risk.
Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.