In order to watch this video, you have to log in or create an account, if you don't have one yet.
Are you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data.
Language: English • Duration: 18:17 • Resolution: 1280x720
KuppingerCole on social media
How can we help you
Send an inquiry
Call Us +49 211 2370770
Mo – Fr 8:00 – 17:00