Privileged User Monitoring as Key Element of Counter-Measures

  • LANGUAGE: English DATE: Tuesday, February 21, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services.

On the other hand, not only compliance requirements but also cyber-attacks are ever-increasing. Attackers are trying to gain access to privileged accounts, hijacking these. Organizations must react. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions. This helps in better identifying fraudulent behavior. It allows getting a grip on access of external users, but also access to external services. It enables a faster detection of, reaction on and remediation of incidents.

In this webinar, you will learn:

  • What are the two sides of compliance?
  • How much data can you collect in a regulated world? And how much do you need to collect?
  • How Privileged User Activity Monitoring can help and what you need to consider when using it
  • How to increase the compliance investment efficiency

In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about examples for regulations that influence both the need and ability for Privileged User Monitoring. He will talk about how to find a balance. Furthermore, he will explain how these approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management blueprint.

In the second part of the webinar, Csaba Krasznay from BalaBit, will give an insight into best practices of Privileged User Monitoring and talks about an industry standard reliable and secure log management tool, which allows customers to collect log data in a centralized manner.


Dr. Csaba Krasznay received his MSc in 2003 in electrical engineering at Budapest University of Technology and Economics. He works for Balabit as a Product Manager. He is responsible for the vision and product strategy of Balabit's Shell Control Box (SCB). He is the member of board at Magyary...

Lead Sponsor

Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide. 

Watch now


Trending Videos

Next Webinar


A DevSecOps Maturity Model for Secrets Management

Recent high-profile software supply chain attacks have highlighted the importance of security in the DevOps environment. But this can be challenging because DevOps teams are at the forefront of digital transformation and use agile techniques to deliver applications quickly, often not following traditional paths of identity management.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00