Webinar Recording

Implementing Zero Trust With Privileged Access Management Platforms

Show description
Speakers
Joe Burke
Chief Architect, PAM, in the Symantec Identity Security Group.
Broadcom
Joe Burke
Joe Burke, Chief Product Architect, Symantec PAM Broadcom Inc. Joe brings significant experience leading cybersecurity solution implementations in Financial verticals and PaaS/SaaS. He has been the Chief Architect for Symantec PAM from its early origins and acquisition of Xceedium by CA...
View profile
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...
View profile
Lead Sponsor
Symantec, A Division of Broadcom
Top related content
Webinar Recording
The Future of Privileged Access Management
Feb 15, 2023

How will  privileged access management change over the next years? How does this change impact your existing PAM infrastructures? What to consider for your buying decisions?

In this webinar, Morey Haber, Chief Security Officer at BeyondTrust, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, discuss trends in the broader PAM space, covering aspects such as

  • Will traditional PAM and CIEM/DREAM converge? And who needs what when?
  • Just-in-time privileges and ephemeral certificates – is this the future of PAM?
  •  Passwordless authentication, access management, single sign-on, and PAM: Where is the intersection and how to resolve conflicts?
  • Software development and application security: When is someone a privileged user?
  • 3rd party risk management: The driver for PAM adoption within the supply chain?

They share concepts and insights and talk about their perspectives on where PAM is evolving and what organizations should keep in mind for their own PAM strategies and implementations.

Webinar Recording
6 Myths of Privileged Access Management Busted
Nov 20, 2019

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Webinar Recording
Zero Trust: Now Is the Time and PBAC Is Key
Feb 11, 2022

Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.

Webinar Recording
Perfecting Privileged Access Management (PAM)
Sep 15, 2023

Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management for DevOps, and other related topics.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will explore the dangers of not having visibility and control over user credentials on multiple devices, especially where the users involved have privileged access to data and services. He will also explain how to choose the right PAM solution.

Zane Bond, Head of Product Management at Keeper Security will explain how next-gen PAM platforms can provide the most critical components of PAM without the complexity of traditional solutions. He will also discuss the key capabilities of the KeeperPAM Platform, such as SSO integration, privileged credential management, credential vaulting, and session management, monitoring, and recording.

Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Event Recording
Panel - The Future of Security & Why Prioritizing PAM is Important?
Jul 13, 2020
Webinar Recording
Trust No One: Zero Trust Strategy and Design
Aug 25, 2021

With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.

Webinar Recording
Zero Trust: Putting Theory Into Practice
Mar 18, 2022

Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective. However, moving from theory into practice can be challenging unless you start with a key element like effective endpoint management.