Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management
- LANGUAGE: English DATE: Wednesday, June 27, 2018 TIME: 11:00 am CEST, 10:00 am BST
Privilege Management has been a key element of both IAM (Identity & Access Management) and cybersecurity programs for years. However, increased complexity of modern corporate IT infrastructures and mounting pressure from compliance regulators force privilege management solutions to constantly expand their scope into new functional areas. From simple password vaults to advanced monitoring and behavior analytics to governance and compliance – a modern PxM solution permeates every corner of your enterprise IT infrastructure.
Designing and implementing your privilege management as a fully integrated and intelligently automated platform unifying all your IT assets both on-premises and in the cloud can therefore bring multiple benefits. Beyond the obvious goals like reducing the risk of privilege misuse or cyberattacks, having every privileged activity accounted for, monitored and recorded for posterity provides unique visibility into your most critical assets and leaves a consistent audit trail in full compliance with regulations like ISO-27001 or PCI DSS.
In this KuppingerCole webinar, you will learn about:
- current status and the latest trends of the Privileged Access Management solution market;
- operational and security benefits of the Privileged Task Management approach compared to traditional PAM/PSM solutions;
- maintaining full audit trail of every administrative action in compliance with every industry regulation.
In the first part of the webinar, Martin Kuppinger, founder and Principal Analyst at KuppingerCole, will look at different approaches towards restricting access of privileged users across heterogeneous environments. He will discuss the various points of time for restricting access, such as during authentication and at runtime, but also the level of granularity that can be achieved using various technical approaches.
In the second part, Andy Harris, Engineering Director at Osirium, will talk about the Privileged Task Management approach, explain how monitoring and recording each administrative activity helps your compliance posture, and, last but not least, how improving security and reducing administrative costs do not have to be mutually exclusive.
Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.
The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.
Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.
Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.