Search

Page 15 of 953 results

Video

Rohit Nambiar: Cloud PAM: Challenges, Considerations And Approach

As Enterprises transitions to IaaS, Cloud Security and specifically IAM strategy and execution becomes crucial. IAM controls for IaaS/Public Cloud need to identify, secure and monitor Privilege Assets at the same time deal with the inherent elasticity, scalability and agility of the Public Cloud . As such a Privileged Access Management Program for Cloud i.e Cloud PAM is required to meet the increasingly stringent compliance and audit regulations and keep enterprises secure.

Keynote

In the Future PAM will Become Embedded in the IT Stack

by Paul Fisher

Paul Fisher will expand on his analysis of how Privileged Access Management platforms will develop support for DevOps and other key users. This will mean that certain PAM functions will be embedded within the technology stack, opening up password free and secure access paths and enable rapid task fulfilment.

Session

Cloud PAM: Challenges, Considerations And Approach

by Rohit Nambiar

As Enterprises transitions to IaaS, Cloud Security and specifically IAM strategy and execution becomes crucial. IAM controls for IaaS/Public Cloud need to identify, secure and monitor Privilege Assets at the same time deal with the inherent elasticity, scalability and agility of the Public Cloud . As such a Privileged Access Management Program for Cloud i.e Cloud PAM is required to meet the increasingly stringent compliance and audit regulations and keep enterprises secure.

Combined Session

PAM: Höchste Sicherheit für kritische Ressourcen und Endpoints • Lektionen von Dinosauriern: Die konvergierende Welt der Identität (ENG) • Sicherheit beginnt hier.......... Identität (ENG)

by Stefan Rabben, Ian Stimpson, Diana Volere

... bietet WALLIX eine europäische, zertifizierte Privileged Access Management (PAM) Lösung an, die die Verwaltung ...

Expert Talk

Full-Stack OAuth Security • Privilege Management and IAM Considerations in Hybrid Environments • The Future of Cybersecurity: Giving your business Leadership the Confidence of Control

by Pamela Dingle, Barry Scott, Suresh Sridharan

The OAuth 2.0 stack has matured but it involves a whole bunch of IETF RFCs. Join Pamela Dingle in a run through of the actual protocols involved in creating an OAuth identity ecosystem that might meet PSD2, Open Banking or high-assurance corporate standards. The goal will to be to see the big picture of how all the bits combine to make a working ecosystem. As traditional definitions of privileged and end users become blurred, privileged identity management extends to much more than managing on-premises and ...

Combined Session

IaaS Cloud Services for the Paranoid • Privilege Management @ BASF

by Dr. Ravindar Bindra, Christian Schwenk

Many companies today are purchasing IaaS as an extension or replacement of their internal data centers and the Infrastructure team is given the task of offering the internal customers a PaaS for their hosted applications. The question of how to secure the data remains uppermost in the minds of CISOs and now even CIOs. For the security professional - it gives a green field in which to architect the utopia of The Perfect Design. When coupled with Operational reality, a more realistic, scalable and simple ...

Combined Session

Securing Elevated Privileges: Integrating Access Governance and Privilege Management • Early Check-in with Identity and Access Governance Best Practices

by Martin Kuppinger, Dr. Horst Walther, Erich Vogel, Idita Israeli Sabag

Why these two areas can’t be handled separately. How to set up guidelines, processes, and organization to manage privileged accounts through their whole life cycle. How to integrate technically.

Combined Session

Role-based Privileges Management - Using Analytics to Quickly Deliver Meaningful Results • Top-down or Bottom-up Roles Modeling: Which Approach fits best?

by Prof. Dr. Dr. Gerd Rossa, Oliver Belikan, Dr. Ron Rymon, Dr. Martin Kuhlmann, Paul Heiden, Rüdiger Berndt, Brent Thurell

Based on the experience of the past few years, Role-based Access Control (RBAC) has emerged as best practice in the management of enterprise privileges, with the major drivers being Identity Management projects and regulatory compliance requirements. Eurekify presents an RBAC implementation approach that is based on pattern-recognition analytics, and has been shown to enable much faster implementation and significant immediate and ongoing benefits to the organization. We will discuss this approach compared ...

Executive View

Executive View: CA Privileged Acces Management Suite

by Anmol Singh

... CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several ... that drive the need for privilege management are: Abuse of shared ... PxM vendors, please refer to the KuppingerCole Leadership Compass on Privilege Management ... as a market-leading Privileged Access Management product. Offering comprehensive PAM capabilities, CA Privileged ... Challenges The CA PAM Suite offers comprehensive privileged access management capabilities that provide ...

Video

Paul Simmonds: Why Your Business Needs a Strategic Approach to PAM

by Paul Simmonds

Often missed as a niche part of IT, “admin” access is the holy grail for the bad-guys attacking your business. Thus, its crucial to understand why a strategic approach to PAM and Credential management will improve your corporate security posture. This talk will look at: The approach management should take to PAM The role of an HSM (High Security Module) in your PAM Strategy Why missing the “Sec” out of Dev-Ops make you the next target