Ninad Chavan: Need for PAM for Secured User Access to Business Applications on Cloud

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


Considering the nature of business, EGI was proactively planning to implement a centralized solution that could:

  • Monitor all the remote users (including business users) taking access to the target servers on Cloud infrastructure from external network
  • Allow secured and seamless file transfer from development to production environments
  • Enable a second factor authentication for users accessing core business applications

PAM helped address the same with:

  • Comprehensive monitoring and access policy management to control and manage user access to critical cloud resources
  • In-built MFA along with a secure and isolated browser-based access of business applications for business users
  • Cross-platform capabilities to enable access to users from any platform for taking access to critical systems anytime from anywhere

Language: English • Duration: 09:51 • Resolution: 1280x720

Learn more about this virtual event