Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information
- LANGUAGE: English DATE: Tuesday, June 14, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against increasingly sophisticated cyberattacks. When it comes to securing privileged systems and data, organizations need to broaden their focus on controlling Authentication, Access and Assets.
In many organizations, provisioning privileged access to critical assets is delivered using legacy Virtual Private Networks (VPNs). VPNs provide access tunnels into an organization’s IT infrastructure that are not designed to protect against the threat of a remote user’s device being compromised and used as an entry point for an attack. Today’s Privileged Management technologies make it possible to provide secure access to privileged systems without VPNs through remote connection protocols that don’t require firewall changes and guard remote connections by encryption.
When organizations implement next-generation remote access platforms in conjunction with password vaults that randomize and rotate passwords, they can greatly increase their security posture and ensure all accounts and access points remain secure. If a privileged user starts a remote session or provides credentials for authentication, nominated approvers can receive notifications with the session details. Approvers can centrally manage and monitor every access request, and every session and actions taken within a session can be recorded and stored for audit and compliance purposes.
This KuppingerCole Webinar will discuss the following topics:
- How to improve business performance by enabling secure access to devices or systems, anywhere on the globe
- Using remote support and privileged access for local applications out of the cloud
- Why Virtual Private Networks (VPNs) can be dangerous when used for privileged access
- How combining privileged session management with a secure password vault exponentially improves your security posture
- Ways to satisfy internal and external compliance requirements
- How to improve productivity while also strengthening security
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the advantages of working on controlled remote connections instead of directly on the sensitive systems themselves. He will also explain why this is especially interesting for cloud systems and servers in hosted environments.
In the second part, William Culbert, Director of Solutions Engineering EMEA at Bomgar Corporation, will describe why companies don’t need to deploy VPNs for securing privileged sessions and why Privileged Access Management solutions can integrate seamlessly with current environments to increase security and raise users’ productivity in their everyday roles.
Der Bedarf nach Cloud-Lösungen ist heute so stark wie nie zuvor. In den letzten Monaten konnten wir weltweit eine steigende Akzeptanz von Cloud Plattformen und Cloud-Diensten beobachten. Sogar die Deutsche Bahn verlagert ihre komplette IT in die Cloud.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.