State-of-the-Art Privilege Management by Design
- LANGUAGE: English DATE: Thursday, October 06, 2016 TIME: 11:00am CEST
The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.
Therefore, Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on servers and workstation alike gets more and more important. Applying a risk-based approach for controlling critical access helps putting the focus on sensitive privileges. And understanding typical admin behaviour as well as identifying undesirable actions can assist you in adapting your Privilege Management strategy as threat patterns change.
In this KuppingerCole Webinar, you will hear about:
- Mitigating external and internal threats effectively by injecting administrative security right from the start into the network design
- Creating resilient, fortified, intelligent and proactive system designs with the right mix of functionalities
- Applying a risk-based approach for controlling and monitoring critical access
- A multi-functional, integrated solution for moderating the abuse of privileged system accounts and entitlements, on endpoints (Mac, Windows) as well as server systems
- Steps to Complete Privileged Account Management
In the first part of the webinar Matthias Reinwarth, Senior Analyst with KuppingerCole will give an overview of the building blocks of an adequate strategy for privilege management. He will explain that today's solutions for managing administrative accounts need to follow a “security by design”-approach and have to go far beyond traditional password vaults and session management systems.
In the second part Brian Chappell, Director Technical Services EMEAI & APAC at BeyondTrust will explain how these building blocks can be leveraged to transform networks into security infrastructures. He will give insight into real-life deployment scenarios between traditional admin account and session management, endpoint security control and intelligent behavioural analytics.
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at: www.beyondtrust.com
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.