The Seven Keys to a Successful Privileged Account Management Strategy

  • LANGUAGE: English DATE: Tuesday, November 17, 2015 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars

Bridging the Gap between User Enablement and Business Protection Effectively

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.

The key disciplines to developing a strategy for effective Privileged Account Management (PAM) are the management and automatic rotation of password, least privileged access, vulnerability integration, centralized reporting and analytics, directory bridging and, last but not least, auditing and protection. This combined strategy enables complete visibility into all user activity and controls identities, not only at the privileged level using a password management solution, but also down to every user identity. Regardless of the system.  

In this KuppingerCole Webinar, we will discuss:  

  • Where many privileged account management strategies fall short

  • How a comprehensive and centralized PAM solution could lower cost of ownership and simplify security policy enforcement  

  • The top 7 PAM capabilities and best practices  

In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, introduces the concept of PAM, which, with increasing deperimeterization, has become increasingly important for nearly every business. Privileged insiders’ accounts are today the primary target for attacks. Holistic PAM approaches go beyond password vaulting by providing contextual security solutions. 

In the second part, Morey Haber, VP of Technology at BeyondTrust, will give advice on where to begin a privileged account management project, how to progress to a higher level of security maturity, and what business outcomes to expect. 


Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Watch now

Downloads

Presentation, KuppingerCole

Presentation, BeyondTrust

Webcast download

Popular Webcasts

Next Webinar

Webinar

Upgrade your IAM with IDaaS IGA

The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00