Privileged User Monitoring as Key Element of Counter-Measures
- LANGUAGE: English DATE: Tuesday, February 21, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
On the other hand, not only compliance requirements but also cyber-attacks are ever-increasing. Attackers are trying to gain access to privileged accounts, hijacking these. Organizations must react. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions. This helps in better identifying fraudulent behavior. It allows getting a grip on access of external users, but also access to external services. It enables a faster detection of, reaction on and remediation of incidents.
In this webinar, you will learn:
- What are the two sides of compliance?
- How much data can you collect in a regulated world? And how much do you need to collect?
- How Privileged User Activity Monitoring can help and what you need to consider when using it
- How to increase the compliance investment efficiency
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about examples for regulations that influence both the need and ability for Privileged User Monitoring. He will talk about how to find a balance. Furthermore, he will explain how these approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management blueprint.
In the second part of the webinar, Csaba Krasznay from BalaBit, will give an insight into best practices of Privileged User Monitoring and talks about an industry standard reliable and secure log management tool, which allows customers to collect log data in a centralized manner.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche Herausforderung und bedarf angemessener Prozesse und Technologien.
European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.