Privileged Access Management Needs a New Approach
- LANGUAGE: English DATE: Tuesday, July 16, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.
Privileged Access Management (PAM) technologies remain a key enabler providing significant benefits for security and risk management leaders by ensuring safe and secure privileged access to the critical resources, infrastructure and information both on-premises and in the cloud. PAM technologies have not only made it easier for organizations to securely adopt cloud applications and infrastructure but also to extend their security policies more consistently into the cloud.
In this webinar you will learn about:
- Various PAM approaches and their potential limitations
- Key considerations while planning a PAM deployment, including the breadth of applications of privileged accounts and activities in a cloud environment
- Common pitfalls to avoid and some common best practices to make PAM a success
- What traditional PAM approaches lack in order to meet the emerging security requirements of increased cloud adoption
In the first part of the webinar, KuppingerCole Lead Analyst Anmol Singh will talk about why PAM is so increasingly relevant for any organizations’ digitalization strategy and what security considerations must be made before starting on a cloud journey.
In the second part, Dave Culbertson, VP of Product at Saviynt will explain why traditional PAM products cannot meet the needs of the cloud’s ephemeral ecosystem, and what you need a modern cloud PAM solution to solve.
1301 E. El Segundo Bl, Suite D • CA 90245 El Segundo • United States
Saviynt’s cloud-built identity and access governance platform helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. The world’s largest brands trust Saviynt to accelerate digital transformation, empower distributed workforces, and meet continuous compliance, including BP, Western Digital, Mass Mutual, and Koch Industries. For more information, please visit saviynt.com.
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.