Ninad Chavan: Need for PAM for Secured User Access to Business Applications on Cloud

In order to watch this video, you have to log in or create an account, if you don't have one yet.
This video is only available to registered participants of the event.

Considering the nature of business, EGI was proactively planning to implement a centralized solution that could:

  • Monitor all the remote users (including business users) taking access to the target servers on Cloud infrastructure from external network
  • Allow secured and seamless file transfer from development to production environments
  • Enable a second factor authentication for users accessing core business applications

PAM helped address the same with:

  • Comprehensive monitoring and access policy management to control and manage user access to critical cloud resources
  • In-built MFA along with a secure and isolated browser-based access of business applications for business users
  • Cross-platform capabilities to enable access to users from any platform for taking access to critical systems anytime from anywhere

Language: English • Duration: 09:51 • Resolution: 1280x720

Learn more about this virtual event

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00