Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

  • LANGUAGE: English DATE: Thursday, June 22, 2017 TIME: 4:00pm CEST, 3:00pm BST, 10:00am ET, 7:00am PT
Upcoming Webinars
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.

But what if instead of scrupulously designing access policies and rigorously monitoring every privileged account’s activities to prevent a malicious user from misusing their privileges one could stop giving anyone privileged access at all? Why delegate access to a sensitive system when you can delegate a specific task? This approach would work best for helpdesk staff, external contractors or outsourced IT administrators – in other words, for anyone who must handle repetitive and mundane maintenance tasks across endpoints, servers, devices, and applications.

By providing out-of-the-box automation for common administrative workflows, such a Privileged Task Management solution would dramatically reduce the risk of privilege misuse or cyber-attack, since there are no longer any privileged sessions to manage and monitor. It would also provide substantial cost and time reduction for helpdesk calls, equipment maintenance and other IT tasks which can be performed more efficiently with automation.

In this KuppingerCole webinar, you will learn about:

  • Current status and the latest trends of the Privileged Access Management solution market;
  • Operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
  • Turning any business process into a pre-packaged workflow, no IT experience or privileged access required.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.

In the second part, Andy Harris, Engineering Director at Osirium, will describe the Privileged Task Management approach in detail and explains what kinds of tasks lend themselves to delegation. Furthermore, he talks about how they can handle input parameters and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.


Speakers

Andy has over 25 years’ experience inventing and building unique IT networking and security products. In a long and distinguished career including being Technical Director at Integralis Andy has invented many leading-edge technologies including IP Network Translation Gateway, Print...


Lead Sponsor

Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.

The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.

Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.

Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Osirium

Webcast download

Popular Webcasts

Next Webinar

Webinar

An overview of the Leadership Compass: Endpoint Security Anti-Malware

Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to help their customer successfully defend against these attacks.

Next Conference

Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00