Reducing Risk with User Behavior Analytics (UBA)
- LANGUAGE: English DATE: Thursday, March 30, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Business landscape is changing rapidly where most organizations, irrespective of the vertical, are transforming themselves into technology organizations. With the adoption of Internet of Things (IoT), the number of connected entities has increased significantly. Managing identities of people, things and other objects in an automated and predictive manner is becoming the new norm. Simultaneously, the burgeoning number of identities exposes a broader attack surface posing a big challenge to these organizations and their growth plans.
Fortunately, Artificial Intelligence (AI) and Machine Learning have matured to the point where making use of analytics in Security broadly is possible. With this more specifically in Identity & Access Management is now possible. One of the most interesting applications of such analytics has been in managing privileged identities and accounts. Given that such identities and accounts have access to sensitive and business critical data, it is very important to ensure that they are not only protected, but also monitored in real time for anomalies in behavior. The use of User Behavior Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk while simultaneously accelerating business growth and expansion.
In this webinar, you will learn more about:
- Evolving trends in the use of analytics in security
- Market trends in privileged access management
- Benefits of analytics in managing access to privileged accounts and identities
- Making analytics work for privileged access
In the first part of the webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole will talk about scenarios where analytics fit in the security landscape. He will show the emerging trends in privileged access management and how organizations can benefit from using analytics to gain visibility into the behavior of these high value accounts and identities.
In the second part, Mark McGovern, VP of Product Management at CA Technologies, will provide insight into some of the practical challenges organizations face in getting analytics to work for privileged identities.
Ditton Park, Riding Court Road • SL3 9LL Datchet, Berkshire • United Kingdom
CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.
2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices (BYODs) , and maintain a secure environment for enterprise and customer identities . However, when it comes to their identity architecture, the picture is typically fragmented. They may have a general Identity and Access Management (IAM) platform from one company, a Privileged Access Management (PAM) solution from another, and some other pieces of IAM deployed, but still face gaps.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.