State-of-the-Art Privilege Management by Design

  • LANGUAGE: English DATE: Thursday, October 06, 2016 TIME: 11:00am CEST
Upcoming Webinars
Injecting administrative security into your network design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

Therefore, Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on servers and workstation alike gets more and more important. Applying a risk-based approach for controlling critical access helps putting the focus on sensitive privileges. And understanding typical admin behaviour as well as identifying undesirable actions can assist you in adapting your Privilege Management strategy as threat patterns change.

In this KuppingerCole Webinar, you will hear about:

  • Mitigating external and internal threats effectively by injecting administrative security right from the start into the network design
  • Creating resilient, fortified, intelligent and proactive system designs with the right mix of functionalities
  • Applying a risk-based approach for controlling and monitoring critical access
  • A multi-functional, integrated solution for moderating the abuse of privileged system accounts and entitlements, on endpoints (Mac, Windows) as well as server systems
  • Steps to Complete Privileged Account Management

In the first part of the webinar Matthias Reinwarth, Senior Analyst with KuppingerCole will give an overview of the building blocks of an adequate strategy for privilege management. He will explain that today's solutions for managing administrative accounts need to follow a “security by design”-approach and have to go far beyond traditional password vaults and session management systems.

In the second part Brian Chappell, Director Technical Services EMEAI & APAC at BeyondTrust will explain how these building blocks can be leveraged to transform networks into security infrastructures. He will give insight into real-life deployment scenarios between traditional admin account and session management, endpoint security control and intelligent behavioural analytics.


Brian Chappell is Deputy Chief Technology Officer at BeyondTrust. Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in both the vendor and the...

Lead Sponsor

BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00