Privileged Access Management Needs a New Approach

  • LANGUAGE: English DATE: Tuesday, July 16, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Privileged Access Management Needs a New Approach Why Traditional PAM Controls Are Not Sufficient to Manage Security Risks in the Cloud

As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.

Privileged Access Management (PAM) technologies remain a key enabler providing significant benefits for security and risk management leaders by ensuring safe and secure privileged access to the critical resources, infrastructure and information both on-premises and in the cloud. PAM technologies have not only made it easier for organizations to securely adopt cloud applications and infrastructure but also to extend their security policies more consistently into the cloud.

In this webinar you will learn about:

  • Various PAM approaches and their potential limitations
  • Key considerations while planning a PAM deployment, including the breadth of applications of privileged accounts and activities in a cloud environment
  • Common pitfalls to avoid and some common best practices to make PAM a success
  • What traditional PAM approaches lack in order to meet the emerging security requirements of increased cloud adoption

In the first part of the webinar, KuppingerCole Lead Analyst Anmol Singh will talk about why PAM is so increasingly relevant for any organizations’ digitalization strategy and what security considerations must be made before starting on a cloud journey.

In the second part, Dave Culbertson, VP of Product at Saviynt will explain why traditional PAM products cannot meet the needs of the cloud’s ephemeral ecosystem, and what you need a modern cloud PAM solution to solve.


Dave Culbertson is the VP of Products at Saviynt. His career in IAM has spanned nearly 17 years and throughout that time has helped hundreds of clients achieve their goals of better compliance and security posture. At Saviynt, Dave is responsible for analyst relations, corporate messaging and...

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

Saviynt’s cloud-built identity and access governance platform helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. The world’s largest brands trust Saviynt to accelerate digital transformation, empower distributed workforces, and meet continuous compliance, including BP, Western Digital, Mass Mutual, and Koch Industries. For more information, please visit

Watch now


Trending Videos

Next Webinar


Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00