Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
- LANGUAGE: English DATE: Thursday, June 22, 2017 TIME: 4:00pm CEST, 3:00pm BST, 10:00am ET, 7:00am PT
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
But what if instead of scrupulously designing access policies and rigorously monitoring every privileged account’s activities to prevent a malicious user from misusing their privileges one could stop giving anyone privileged access at all? Why delegate access to a sensitive system when you can delegate a specific task? This approach would work best for helpdesk staff, external contractors or outsourced IT administrators – in other words, for anyone who must handle repetitive and mundane maintenance tasks across endpoints, servers, devices, and applications.
By providing out-of-the-box automation for common administrative workflows, such a Privileged Task Management solution would dramatically reduce the risk of privilege misuse or cyber-attack, since there are no longer any privileged sessions to manage and monitor. It would also provide substantial cost and time reduction for helpdesk calls, equipment maintenance and other IT tasks which can be performed more efficiently with automation.
In this KuppingerCole webinar, you will learn about:
- Current status and the latest trends of the Privileged Access Management solution market;
- Operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
- Turning any business process into a pre-packaged workflow, no IT experience or privileged access required.
In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.
In the second part, Andy Harris, Engineering Director at Osirium, will describe the Privileged Task Management approach in detail and explains what kinds of tasks lend themselves to delegation. Furthermore, he talks about how they can handle input parameters and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.
Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.
The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.
Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.
Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.
The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.