Solving Problems in Privileged Access Management with Automation
- LANGUAGE: English DATE: Tuesday, March 03, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.
However, we should not blame digital transformation for this or the desire for organizations to become more competitive. Instead we should look at ways of making PAM fit for purpose in the age of multiple privileged accounts being given to non-traditional privileged account users, as well as traditional users.
Join this KuppingerCole webinar to learn:
- Why privileged accounts are of great interest to hackers and organized crime
- How criminals find and target users of privileged accounts
- How breached privileged accounts pose a danger to the compliance posture of your company
- Why the best PAM runs in the background as much as possible allowing your IT staff to get on with their day-to-day tasks
In the first part of the webinar, KuppingerCole Senior Analyst Paul Fisher, will give a definition of PAM and explain how organized cybercrime targets privileged accounts and why it has become easier.
He will be joined by Mark Warren, Product Marketing Manager at Osirium, who believes the focus has been too much on identity rather than privileged access. Also, rather than treating PAM as a chore, combining PAM with automation and managing privileged accounts on users’ computers can have positive effects on business operations.
Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.
The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.
Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.
Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.