Best Practices of Privileged Identity Management
- LANGUAGE: English DATE: Wednesday, June 20, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.
Poorly managed privileged access not only leaves organizations exposed to security breaches but can also attract severe business losses and financial penalties resulting from regulatory conflicts and compliance deficits. Privilege Management has emerged as an area of growing concern and investment for most organizations trying to gain a better control of unmanaged and unsupervised access to their assets, especially in a hybrid IT environment.
In this webinar, we will discuss the evolving landscape of privilege management technologies along with the best implementation practices for a sustainable and risk-aware privilege management solution.
- What are the primary drivers for organizations to implement privilege management?
- What key privilege management technologies are available in the market?
- What are the best practices for managing privileged access?
In the first part of this webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the privilege management challenges that organizations are facing along with the key drivers for implementing a privilege management solution. He will also discuss the technology landscape and how should organizations evaluate the right privilege management product based on their requirements. In the final section, Anmol will offer best practices and recommendations for organizations to implement a privilege management solution.
In the second part of this webinar, Karl Lankford, Sr. Solutions Engineer at Bomgar, will provide practical insight into how you can build strong cyber defense behind the firewall with an automated Privileged Identity Management solution.
Bomgar’s secure access solutions enable customers to easily support people, access and protect endpoints, and defend privileged credentials, in order to fight cyber threats and speed business performance. More than 13,000 organizations around the globe use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar clients include some of the world’s leading IT outsourcers, systems integrators, software vendors, healthcare organizations, government agencies, universities, financial institutions, and retailers. Bomgar is privately held with offices in Atlanta, Austin, Jackson, Los Angeles, Washington D.C., Frankfurt, London, Paris, and Singapore. Connect with Bomgar at www.bomgar.com.
The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.