Privileged Access Management Needs a New Approach
- LANGUAGE: English DATE: Tuesday, July 16, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Why Traditional PAM Controls Are Not Sufficient to Manage Security Risks in the Cloud
As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.
Privileged Access Management (PAM) technologies remain a key enabler providing significant benefits for security and risk management leaders by ensuring safe and secure privileged access to the critical resources, infrastructure and information both on-premises and in the cloud. PAM technologies have not only made it easier for organizations to securely adopt cloud applications and infrastructure but also to extend their security policies more consistently into the cloud.
In this webinar you will learn about:
- Various PAM approaches and their potential limitations
- Key considerations while planning a PAM deployment, including the breadth of applications of privileged accounts and activities in a cloud environment
- Common pitfalls to avoid and some common best practices to make PAM a success
- What traditional PAM approaches lack in order to meet the emerging security requirements of increased cloud adoption
In the first part of the webinar, KuppingerCole Lead Analyst Anmol Singh will talk about why PAM is so increasingly relevant for any organizations’ digitalization strategy and what security considerations must be made before starting on a cloud journey.
In the second part, Dave Culbertson, VP of Product at Saviynt will explain why traditional PAM products cannot meet the needs of the cloud’s ephemeral ecosystem, and what you need a modern cloud PAM solution to solve.
Access Governance and Intelligence for Cloud and Enterprise Applications
Saviynt offers Access Governance and Intelligence solutions for Cloud, Enterprise Applications and Big Data Platforms. Saviynt combines traditional access governance features with advanced usage analytics, data access governance and compliance controls to secure organization’s critical assets.
Saviynt helps organizations extend IAM processes seamlessly to Cloud and provide the ability to request access to fine-grained business processes and transactions. The innovative product portfolio also offers the ability to identify sensitive data, enforce controls to detect and prevent data loss, privileged access governance, user behavior analytics among many other advanced features.
The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.