Privileged User Monitoring as Key Element of Counter-Measures
- LANGUAGE: English DATE: Tuesday, February 21, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
On the other hand, not only compliance requirements but also cyber-attacks are ever-increasing. Attackers are trying to gain access to privileged accounts, hijacking these. Organizations must react. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions. This helps in better identifying fraudulent behavior. It allows getting a grip on access of external users, but also access to external services. It enables a faster detection of, reaction on and remediation of incidents.
In this webinar, you will learn:
- What are the two sides of compliance?
- How much data can you collect in a regulated world? And how much do you need to collect?
- How Privileged User Activity Monitoring can help and what you need to consider when using it
- How to increase the compliance investment efficiency
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about examples for regulations that influence both the need and ability for Privileged User Monitoring. He will talk about how to find a balance. Furthermore, he will explain how these approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management blueprint.
In the second part of the webinar, Csaba Krasznay from BalaBit, will give an insight into best practices of Privileged User Monitoring and talks about an industry standard reliable and secure log management tool, which allows customers to collect log data in a centralized manner.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.