Privileged User Monitoring as Key Element of Counter-Measures
- LANGUAGE: English DATE: Tuesday, February 21, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This extends the risk surface. It is no longer about protecting some centralized servers in a well-secured data center, but about a sprawl of systems and services.
On the other hand, not only compliance requirements but also cyber-attacks are ever-increasing. Attackers are trying to gain access to privileged accounts, hijacking these. Organizations must react. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions. This helps in better identifying fraudulent behavior. It allows getting a grip on access of external users, but also access to external services. It enables a faster detection of, reaction on and remediation of incidents.
In this webinar, you will learn:
- What are the two sides of compliance?
- How much data can you collect in a regulated world? And how much do you need to collect?
- How Privileged User Activity Monitoring can help and what you need to consider when using it
- How to increase the compliance investment efficiency
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about examples for regulations that influence both the need and ability for Privileged User Monitoring. He will talk about how to find a balance. Furthermore, he will explain how these approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management blueprint.
In the second part of the webinar, Csaba Krasznay from BalaBit, will give an insight into best practices of Privileged User Monitoring and talks about an industry standard reliable and secure log management tool, which allows customers to collect log data in a centralized manner.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
With the Revised Payment Service Directive (PSD2) coming into full effect this fall, banks and online retailers need to adapt to changes that carry with them many regulatory and technical challenges. Acknowledging these extensive changes, Germany’s Federal Financial Supervisory Authority (BaFin) recently granted a period of grace for online retailers to implement the element of strong customer authentication (SCA), thus following the lead of other European financial regulatory authorities.
At the Consumer Identity World you learn how to balance the user experience, privacy, and security of your connected customer and how to enhance the customers' journey by leveraging Artificial Intelligence (AI) and Machine Learning (ML) to provide a superior and customized experience.