Why Managing Privileged Users Benefits your Business
- LANGUAGE: English DATE: Tuesday, September 27, 2011 TIME: 12:00 CEST
With the two most critical assets in any organization being the employees and the information which resides in the company, getting the right alignment between the workers and the information which they are allowed to access has always been a critical requirement. However, an often overlooked group of users are those privileged users who need to manage the systems where this information resides and who often use anonymous, shared or system accounts to access the infrastructure providing them, either intentionally or not, with access to any company resource and the corresponding business sensitive information.
Compliance requirements dictate that this privileged user access is managed and that separation of duty conflicts are controlled, yet 10% of IT professionals state that they can still access system at previous job and as many as 41% admit that they share account names and passwords.
Privileged User Management provides your business a simple solution to ensuring company assets remaining accessible only to those who need them, and to ensuring you can control and monitor the way your outsourcers, contractors and permanent privileged users have efficient and secure access to the systems they manage.
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software´s Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Some of the key topics Martin and Phil will talk about in this webinar:
- What are the challenges solved by privileged user management?
- How to efficiently manage privileged identities across UNIX, Linux, Windows and virtual servers
- The relationship between privileged users and privileged account management
- How to meet ISO 27001 requirements with your privileged user management
- Managing privileged identities in the cloud
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.