Why Managing Privileged Users Benefits your Business
- LANGUAGE: English DATE: Tuesday, September 27, 2011 TIME: 12:00 CEST
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
With the two most critical assets in any organization being the employees and the information which resides in the company, getting the right alignment between the workers and the information which they are allowed to access has always been a critical requirement. However, an often overlooked group of users are those privileged users who need to manage the systems where this information resides and who often use anonymous, shared or system accounts to access the infrastructure providing them, either intentionally or not, with access to any company resource and the corresponding business sensitive information.
Compliance requirements dictate that this privileged user access is managed and that separation of duty conflicts are controlled, yet 10% of IT professionals state that they can still access system at previous job and as many as 41% admit that they share account names and passwords.
Privileged User Management provides your business a simple solution to ensuring company assets remaining accessible only to those who need them, and to ensuring you can control and monitor the way your outsourcers, contractors and permanent privileged users have efficient and secure access to the systems they manage.
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software´s Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Some of the key topics Martin and Phil will talk about in this webinar:
- What are the challenges solved by privileged user management?
- How to efficiently manage privileged identities across UNIX, Linux, Windows and virtual servers
- The relationship between privileged users and privileged account management
- How to meet ISO 27001 requirements with your privileged user management
- Managing privileged identities in the cloud
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices (BYODs) , and maintain a secure environment for enterprise and customer identities . However, when it comes to their identity architecture, the picture is typically fragmented. They may have a general Identity and Access Management (IAM) platform from one company, a Privileged Access Management (PAM) solution from another, and some other pieces of IAM deployed, but still face gaps.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.