Solving Problems in Privileged Access Management with Automation
- LANGUAGE: English DATE: Tuesday, March 03, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.
However, we should not blame digital transformation for this or the desire for organizations to become more competitive. Instead we should look at ways of making PAM fit for purpose in the age of multiple privileged accounts being given to non-traditional privileged account users, as well as traditional users.
Join this KuppingerCole webinar to learn:
- Why privileged accounts are of great interest to hackers and organized crime
- How criminals find and target users of privileged accounts
- How breached privileged accounts pose a danger to the compliance posture of your company
- Why the best PAM runs in the background as much as possible allowing your IT staff to get on with their day-to-day tasks
In the first part of the webinar, KuppingerCole Senior Analyst Paul Fisher, will give a definition of PAM and explain how organized cybercrime targets privileged accounts and why it has become easier.
He will be joined by Mark Warren, Product Marketing Manager at Osirium, who believes the focus has been too much on identity rather than privileged access. Also, rather than treating PAM as a chore, combining PAM with automation and managing privileged accounts on users’ computers can have positive effects on business operations.
Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.
The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.
Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.
Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.