Monitor your cloud administrators and managed service operators – avoid privilege abuse and fraud
- LANGUAGE: English DATE: Tuesday, April 14, 2015 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged operator and administrator access, to these services. Who can manage your cloud services, particularly the ones that offer just one shared administrative account? And who controls the access of external operators to your services?
Putting in a privilege management layer that manages access to shared accounts and monitors the privileged user – i.e. operator and administrator – behaviour helps mitigating risks. This works for both outbound access to cloud services by internal users and inbound access to applications and services that are managed by external suppliers.
By attending to this KuppingerCole webinar, you will understand
- The increasing risk and attack surface created by cloud services, managed services, and outsourcing
- The most critical risks in such environments
- Approaches on how to mitigate these risks
- The role Privilege Monitoring plays in mitigation
In this KuppingerCole webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will look at the risk surface, the most critical risks, and provides an overview on how to mitigate these risks.
In the second part, Csaba Krasznay, Product Manager for Shell Control Box of Balabit will talk about the use of Privilege Monitoring for mitigating these risks, based on a number of real-world customer scenarios.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.