Ninad Chavan: Need for PAM for Secured User Access to Business Applications on Cloud
Considering the nature of business, EGI was proactively planning to implement a centralized solution that could:
- Monitor all the remote users (including business users) taking access to the target servers on Cloud infrastructure from external network
- Allow secured and seamless file transfer from development to production environments
- Enable a second factor authentication for users accessing core business applications
PAM helped address the same with:
- Comprehensive monitoring and access policy management to control and manage user access to critical cloud resources
- In-built MFA along with a secure and isolated browser-based access of business applications for business users
- Cross-platform capabilities to enable access to users from any platform for taking access to critical systems anytime from anywhere
Language: English • Duration: 09:51 • Resolution: 1280x720
Learn more about this virtual eventLatest Insights