Reducing Risk with User Behavior Analytics (UBA)
- LANGUAGE: English DATE: Thursday, March 30, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Fortunately, Artificial Intelligence (AI) and Machine Learning have matured to the point where making use of analytics in Security broadly is possible. With this more specifically in Identity & Access Management is now possible. One of the most interesting applications of such analytics has been in managing privileged identities and accounts. Given that such identities and accounts have access to sensitive and business critical data, it is very important to ensure that they are not only protected, but also monitored in real time for anomalies in behavior. The use of User Behavior Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk while simultaneously accelerating business growth and expansion.
In this webinar, you will learn more about:
- Evolving trends in the use of analytics in security
- Market trends in privileged access management
- Benefits of analytics in managing access to privileged accounts and identities
- Making analytics work for privileged access
In the first part of the webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole will talk about scenarios where analytics fit in the security landscape. He will show the emerging trends in privileged access management and how organizations can benefit from using analytics to gain visibility into the behavior of these high value accounts and identities.
In the second part, Mark McGovern, VP of Product Management at CA Technologies, will provide insight into some of the practical challenges organizations face in getting analytics to work for privileged identities.
Ditton Park, Riding Court Road • SL3 9LL Datchet, Berkshire • United Kingdom
CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.
With so many different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. That is why the combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business.