State-of-the-Art Privilege Management by Design

  • LANGUAGE: English DATE: Thursday, October 06, 2016 TIME: 11:00am CEST
Upcoming Webinars
Injecting administrative security into your network design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

Therefore, Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on servers and workstation alike gets more and more important. Applying a risk-based approach for controlling critical access helps putting the focus on sensitive privileges. And understanding typical admin behaviour as well as identifying undesirable actions can assist you in adapting your Privilege Management strategy as threat patterns change.

In this KuppingerCole Webinar, you will hear about:

  • Mitigating external and internal threats effectively by injecting administrative security right from the start into the network design
  • Creating resilient, fortified, intelligent and proactive system designs with the right mix of functionalities
  • Applying a risk-based approach for controlling and monitoring critical access
  • A multi-functional, integrated solution for moderating the abuse of privileged system accounts and entitlements, on endpoints (Mac, Windows) as well as server systems
  • Steps to Complete Privileged Account Management

In the first part of the webinar Matthias Reinwarth, Senior Analyst with KuppingerCole will give an overview of the building blocks of an adequate strategy for privilege management. He will explain that today's solutions for managing administrative accounts need to follow a “security by design”-approach and have to go far beyond traditional password vaults and session management systems.

In the second part Brian Chappell, Director Technical Services EMEAI & APAC at BeyondTrust will explain how these building blocks can be leveraged to transform networks into security infrastructures. He will give insight into real-life deployment scenarios between traditional admin account and session management, endpoint security control and intelligent behavioural analytics.


Brian Chappell is Deputy Chief Technology Officer at BeyondTrust. Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in both the vendor and the...

Lead Sponsor

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at:

Watch now


Popular Videos

Next Webinar


Why Continuous API Security Is Key to Protecting Your Digital Business

In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing only on the operational aspects is no longer enough.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00