Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

  • LANGUAGE: English DATE: Tuesday, June 14, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information A new approach to Privileged Access Management

In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against increasingly sophisticated cyberattacks. When it comes to securing privileged systems and data, organizations need to broaden their focus on controlling Authentication, Access and Assets.

In many organizations, provisioning privileged access to critical assets is delivered using legacy Virtual Private Networks (VPNs). VPNs provide access tunnels into an organization’s IT infrastructure that are not designed to protect against the threat of a remote user’s device being compromised and used as an entry point for an attack. Today’s Privileged Management technologies make it possible to provide secure access to privileged systems without VPNs through remote connection protocols that don’t require firewall changes and guard remote connections by encryption.

When organizations implement next-generation remote access platforms in conjunction with password vaults that randomize and rotate passwords, they can greatly increase their security posture and ensure all accounts and access points remain secure. If a privileged user starts a remote session or provides credentials for authentication, nominated approvers can receive notifications with the session details. Approvers can centrally manage and monitor every access request, and every session and actions taken within a session can be recorded and stored for audit and compliance purposes.

This KuppingerCole Webinar will discuss the following topics:

  • How to improve business performance by enabling secure access to devices or systems, anywhere on the globe
  • Using remote support and privileged access for local applications out of the cloud
  • Why Virtual Private Networks (VPNs) can be dangerous when used for privileged access
  • How combining privileged session management with a secure password vault exponentially improves your security posture
  • Ways to satisfy internal and external compliance requirements
  • How to improve productivity while also strengthening security

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the advantages of working on controlled remote connections instead of directly on the sensitive systems themselves. He will also explain why this is especially interesting for cloud systems and servers in hosted environments.

In the second part, William Culbert, Director of Solutions Engineering EMEA at Bomgar Corporation, will describe why companies don’t need to deploy VPNs for securing privileged sessions and why Privileged Access Management solutions can integrate seamlessly with current environments to increase security and raise users’ productivity in their everyday roles.


Speakers

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00