Reducing Risk with User Behavior Analytics (UBA)
- LANGUAGE: English DATE: Thursday, March 30, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Business landscape is changing rapidly where most organizations, irrespective of the vertical, are transforming themselves into technology organizations. With the adoption of Internet of Things (IoT), the number of connected entities has increased significantly. Managing identities of people, things and other objects in an automated and predictive manner is becoming the new norm. Simultaneously, the burgeoning number of identities exposes a broader attack surface posing a big challenge to these organizations and their growth plans.
Fortunately, Artificial Intelligence (AI) and Machine Learning have matured to the point where making use of analytics in Security broadly is possible. With this more specifically in Identity & Access Management is now possible. One of the most interesting applications of such analytics has been in managing privileged identities and accounts. Given that such identities and accounts have access to sensitive and business critical data, it is very important to ensure that they are not only protected, but also monitored in real time for anomalies in behavior. The use of User Behavior Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk while simultaneously accelerating business growth and expansion.
In this webinar, you will learn more about:
- Evolving trends in the use of analytics in security
- Market trends in privileged access management
- Benefits of analytics in managing access to privileged accounts and identities
- Making analytics work for privileged access
In the first part of the webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole will talk about scenarios where analytics fit in the security landscape. He will show the emerging trends in privileged access management and how organizations can benefit from using analytics to gain visibility into the behavior of these high value accounts and identities.
In the second part, Mark McGovern, VP of Product Management at CA Technologies, will provide insight into some of the practical challenges organizations face in getting analytics to work for privileged identities.
Ditton Park, Riding Court Road • SL3 9LL Datchet, Berkshire • United Kingdom
CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.