Reducing Risk with User Behavior Analytics (UBA)
- LANGUAGE: English DATE: Thursday, March 30, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Fortunately, Artificial Intelligence (AI) and Machine Learning have matured to the point where making use of analytics in Security broadly is possible. With this more specifically in Identity & Access Management is now possible. One of the most interesting applications of such analytics has been in managing privileged identities and accounts. Given that such identities and accounts have access to sensitive and business critical data, it is very important to ensure that they are not only protected, but also monitored in real time for anomalies in behavior. The use of User Behavior Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk while simultaneously accelerating business growth and expansion.
In this webinar, you will learn more about:
- Evolving trends in the use of analytics in security
- Market trends in privileged access management
- Benefits of analytics in managing access to privileged accounts and identities
- Making analytics work for privileged access
In the first part of the webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole will talk about scenarios where analytics fit in the security landscape. He will show the emerging trends in privileged access management and how organizations can benefit from using analytics to gain visibility into the behavior of these high value accounts and identities.
In the second part, Mark McGovern, VP of Product Management at CA Technologies, will provide insight into some of the practical challenges organizations face in getting analytics to work for privileged identities.
Ditton Park, Riding Court Road • SL3 9LL Datchet, Berkshire • United Kingdom
CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.
Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.
The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.