Privileged User Monitoring as Key Element of Counter-Measures
- LANGUAGE: English DATE: Tuesday, February 21, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
On the other hand, not only compliance requirements but also cyber-attacks are ever-increasing. Attackers are trying to gain access to privileged accounts, hijacking these. Organizations must react. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions. This helps in better identifying fraudulent behavior. It allows getting a grip on access of external users, but also access to external services. It enables a faster detection of, reaction on and remediation of incidents.
In this webinar, you will learn:
- What are the two sides of compliance?
- How much data can you collect in a regulated world? And how much do you need to collect?
- How Privileged User Activity Monitoring can help and what you need to consider when using it
- How to increase the compliance investment efficiency
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about examples for regulations that influence both the need and ability for Privileged User Monitoring. He will talk about how to find a balance. Furthermore, he will explain how these approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management blueprint.
In the second part of the webinar, Csaba Krasznay from BalaBit, will give an insight into best practices of Privileged User Monitoring and talks about an industry standard reliable and secure log management tool, which allows customers to collect log data in a centralized manner.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
To survive the fierce market competition in the era of Digital Transformation, businesses strive to be as agile as possible, to quickly adjust to constantly changing customer demands, industry regulations and modern technologies. Driven by cloud transformation and digitalization, modern companies are becoming increasingly open and interconnected, with massive numbers of people, devices and applications forming millions of relationships across geographically and technologically diverse environments.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.