Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Are you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data.
Language: English • Duration: 18:17 • Resolution: 1280x720
Security Orchestration Automation and Response (SOAR)
Privileged Access Management solutions for Agile, multi-cloud and DevOps environments
Protecting Intellectual Properties while enabling business agility with R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Oracle APEX – secure low-code application development platform
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning