Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

  • LANGUAGE: English DATE: Thursday, June 22, 2017 TIME: 4:00pm CEST, 3:00pm BST, 10:00am ET, 7:00am PT
Upcoming Webinars
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.

But what if instead of scrupulously designing access policies and rigorously monitoring every privileged account’s activities to prevent a malicious user from misusing their privileges one could stop giving anyone privileged access at all? Why delegate access to a sensitive system when you can delegate a specific task? This approach would work best for helpdesk staff, external contractors or outsourced IT administrators – in other words, for anyone who must handle repetitive and mundane maintenance tasks across endpoints, servers, devices, and applications.

By providing out-of-the-box automation for common administrative workflows, such a Privileged Task Management solution would dramatically reduce the risk of privilege misuse or cyber-attack, since there are no longer any privileged sessions to manage and monitor. It would also provide substantial cost and time reduction for helpdesk calls, equipment maintenance and other IT tasks which can be performed more efficiently with automation.

In this KuppingerCole webinar, you will learn about:

  • Current status and the latest trends of the Privileged Access Management solution market;
  • Operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
  • Turning any business process into a pre-packaged workflow, no IT experience or privileged access required.

In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.

In the second part, Andy Harris, Engineering Director at Osirium, will describe the Privileged Task Management approach in detail and explains what kinds of tasks lend themselves to delegation. Furthermore, he talks about how they can handle input parameters and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.


Andy has over 25 years’ experience inventing and building unique IT networking and security products. In a long and distinguished career including being Technical Director at Integralis Andy has invented many leading-edge technologies including IP Network Translation Gateway, Print...

Lead Sponsor

Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.

The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.

Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.

Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.

Watch now


Webinar Presentation, KuppingerCole

Webinar Presentation, Osirium

Webcast download

Popular Webcasts

Next Webinar


Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.

Next Conference


Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00