Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.Join Thycotic chief security scientist and author Joseph Carson as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also share how Thycotic’s new Access Control solutions can safeguard cloud access by both IT and business users.
Language: English • Duration: 18:59 • Resolution: 1280x720
BMC Helix ITSM
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Database and Big Data Security
Leveraging Your Organization's Expertise: Departmental IAM Services for the Business
Digital Workplace Delivery Platforms
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity