How to Ensure the Success of Your Privileged Access Management Projects

  • LANGUAGE: English DATE: Tuesday, January 19, 2016 TIME: 4:00pm CET, 3:00pm GMT
Upcoming Webinars
Don’t let your PAM project stall – successfully secure your organisation against internal and external attackers

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged access management (PAM).

However, success is not easy to achieve and many PAM projects stall. To avoid this, organisations have to follow a well-planned strategy and know where to begin. What shall be protected? Passwords of shared accounts only? Or also the ones of other accounts with elevated privileges? What about restricting access in administrator sessions or monitoring sessions? And for which systems? Setting the scope and expectations is the starting point for a successful project. But there are more challenges to solve when successfully running PAM – learn about these in this webinar.

This KuppingerCole Webinar provides:

  • Information on why organisations do PAM
  • Insight in why PAM projects stall
  • An Overview of the most common risks in setting up PAM projects
  • Case studies: real-world examples
  • Recipe for success – top tips

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the reasons why organisations carry out more and more PAM projects in today's fast-changing threat landscape and why they, however, sometimes stall.

Alan Radford, principal solutions architect EMEA with Dell Security, will share in the second part of this webinar the secrets of successfully implementing a PAM solution. He will refer to real-world examples and conclude with helpful recipes for success of PAM projects.


Speakers

Alan is a technology strategist responsible for the PAM field strategy in EMEA for One Identity, with 15 years’ experience in Identity Access Management. An experienced business owner and subject matter expert in Identity Governance and Privileged Access Management, he has worked with...

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00