Search

Page 7 of 1000 results

Video

Didier Cohen: Forget About Complex PAM Projects: Now’s the Time for Quick, Easy and TCO-efficient Privileged Access Management

... is a growing need to secure access to critical infrastructure assets. IT ... have identified the need for a Privileged Access Management solution but, as their infrastructures ...

Keynote

Forget About Complex PAM Projects: Now’s the Time for Quick, Easy and TCO-efficient Privileged Access Management

by Didier Cohen

... is a growing need to secure access to critical infrastructure assets. IT ... have identified the need for a Privileged Access Management solution but, as their infrastructures ...

Expert Talk

How to Put Identity Analytics into Action • Open Source Identity: Building Your Own Enterprise Identity Platform • Five Easy Steps to Assess the Effectiveness of your Privileged Access Management Program

by Scott Brady, Ingo Schubert, Holger Weihe

... . Come see how RSA SecurID® Access and RSA NetWitness® Platform correlate ... booming - and vulnerabilities in your privileged access management (PAM) infrastructure and practices open the ... assess the maturity of your PAM systems and processes, and take ... KuppingerCole’s Leadership Compass report for Access Management and Privileged Access Management, to hear about innovative ...

Video

Privileged Access Management Buzzwords

by Martin Kuppinger

Webinar

How to Ensure the Success of Your Privileged Access Management Projects

... up their defences start with privileged access management (PAM). However, success is not ... other accounts with elevated privileges? What about restricting access in administrator sessions ... to solve when successfully running PAM – learn about these in ... on why organisations do PAM Insight in why PAM projects stall An ... common risks in setting up PAM projects Case studies: real-world ... carry out more and more PAM projects in today's fast-changing ... the secrets of successfully implementing a PAM solution. He will refer to ...

Video

Privileged Access Management Needs a New Approach

by Anmol Singh

As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.

Combined Session

Privileged Access Management (PAM) put into Context – Access Governance Strategy or just Tactics? • Panel: Privileged Identities - Identify, Delegate, Enforce, Audit

by Martin Kuppinger, Jochen Koehler, Philip Lieberman, Nimrod Vax

... need to maintain and safeguard privileged accounts, but oftentimes, nothing is ... help organizations regain control of privileged accounts in a cost-effective manner ... operational efficiency, take control of privileged accounts and close security gaps ... assets, their privileged accounts and interdependencies;How to delegate access so that ... appropriate personnel, using least privilege required, with ... duration of each privileged access request is documented and management is made aware ...

Pre-conference Event

Privileged Access Management – Made Tangible by Concrete Analogies

by Matthias Reinwarth, Kai Buedel, Florian Geisel

... complete functional range of ARCON Privileged Access Management, based on analogies like doors ... , locks, tokens, access authorizations, surveillance cameras etc. Two ...

Video

How to Ensure the Success of Your Privileged Access Management Projects

by Martin Kuppinger

KuppingerCole Webinar recording

Video

The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

by Martin Kuppinger

Kuppinger Cole Webinar Recording