Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

  • LANGUAGE: English DATE: Tuesday, June 14, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information A new approach to Privileged Access Management

In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against increasingly sophisticated cyberattacks. When it comes to securing privileged systems and data, organizations need to broaden their focus on controlling Authentication, Access and Assets.

In many organizations, provisioning privileged access to critical assets is delivered using legacy Virtual Private Networks (VPNs). VPNs provide access tunnels into an organization’s IT infrastructure that are not designed to protect against the threat of a remote user’s device being compromised and used as an entry point for an attack. Today’s Privileged Management technologies make it possible to provide secure access to privileged systems without VPNs through remote connection protocols that don’t require firewall changes and guard remote connections by encryption.

When organizations implement next-generation remote access platforms in conjunction with password vaults that randomize and rotate passwords, they can greatly increase their security posture and ensure all accounts and access points remain secure. If a privileged user starts a remote session or provides credentials for authentication, nominated approvers can receive notifications with the session details. Approvers can centrally manage and monitor every access request, and every session and actions taken within a session can be recorded and stored for audit and compliance purposes.

This KuppingerCole Webinar will discuss the following topics:

  • How to improve business performance by enabling secure access to devices or systems, anywhere on the globe
  • Using remote support and privileged access for local applications out of the cloud
  • Why Virtual Private Networks (VPNs) can be dangerous when used for privileged access
  • How combining privileged session management with a secure password vault exponentially improves your security posture
  • Ways to satisfy internal and external compliance requirements
  • How to improve productivity while also strengthening security

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the advantages of working on controlled remote connections instead of directly on the sensitive systems themselves. He will also explain why this is especially interesting for cloud systems and servers in hosted environments.

In the second part, William Culbert, Director of Solutions Engineering EMEA at Bomgar Corporation, will describe why companies don’t need to deploy VPNs for securing privileged sessions and why Privileged Access Management solutions can integrate seamlessly with current environments to increase security and raise users’ productivity in their everyday roles.


Watch now


Popular Videos

Next Webinar


Urgent Need to Protect the Most Critical Business Assets: Data & People

Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00