Search

Page 87 of 944 results

Blog

Creating new attack surfaces in VMs and Network Security devices

by Martin Kuppinger

... integrated with the provisioning and PxM (Privileged "whatever - user, identity, access ... devices consistently by management tools, PxM with support for these devices ...

Video

Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

by Matthias Reinwarth

In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against increasingly sophisticated cyberattacks. When it comes to securing privileged systems and data, organizations need to broaden their focus on controlling Authentication, Access and Assets.

Video

John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Combined Session

Leading the Information Security Transformation • Putting IAM at the Center of (Cyber) Security: Creating an Identity-Aware IT Ecosystem

by Martin Kuppinger, Darran Rolls

... – from MDM to ITSM to PAM to UBA and beyond - organizations ...

Video

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

by Martin Kuppinger

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Video

The Seven Keys to a Successful Privileged Account Management Strategy

by Alexei Balaganski

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.

Video

Intelligente Protokollierung von Aktivitäten

by Martin Kuppinger

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten Nutzern und Administratoren können Fehlverhalten und daraus resultierende Gefahren schneller erkannt und weitere negative Auswirkungen für Systeme, Anwendungen und Daten verhindert werden.

Video

Controlling and Monitoring Administrative Access to Enterprise IT

by Matthias Reinwarth

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Video

Bedrohungen für privilegierte Zugänge erkennen und abwenden

by Matthias Reinwarth

Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein Problem, dem sich alle Unternehmen stellen müssen.

Video

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being connected to enterprise networks and to the internet. This brings many business advantages but also opens these once isolated technologies to advance threats. Securing these privileged account and their privileged ...