The Seven Keys to a Successful Privileged Account Management Strategy
- LANGUAGE: English DATE: Tuesday, November 17, 2015 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.
The key disciplines to developing a strategy for effective Privileged Account Management (PAM) are the management and automatic rotation of password, least privileged access, vulnerability integration, centralized reporting and analytics, directory bridging and, last but not least, auditing and protection. This combined strategy enables complete visibility into all user activity and controls identities, not only at the privileged level using a password management solution, but also down to every user identity. Regardless of the system.
In this KuppingerCole Webinar, we will discuss:
Where many privileged account management strategies fall short
How a comprehensive and centralized PAM solution could lower cost of ownership and simplify security policy enforcement
The top 7 PAM capabilities and best practices
In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, introduces the concept of PAM, which, with increasing deperimeterization, has become increasingly important for nearly every business. Privileged insiders’ accounts are today the primary target for attacks. Holistic PAM approaches go beyond password vaulting by providing contextual security solutions.
In the second part, Morey Haber, VP of Technology at BeyondTrust, will give advice on where to begin a privileged account management project, how to progress to a higher level of security maturity, and what business outcomes to expect.
As modern businesses across all verticals continue their rapid digitalization, the need to store, process and exchange data securely is becoming an essential factor for any company. However, this is particularly challenging for high-tech companies dealing with highly-sensitive R&D data.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.