Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
As the adoption of cloud applications and services accelerates, organizations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. With 77% of cloud breaches due to compromised credentials, making sure your users get easy and secure access to the cloud should be a top priority.Join Thycotic chief security scientist and author Joseph Carson as he explains a practical approach to help you define and implement privileged access cloud security best practices. He will also share how Thycotic’s new Access Control solutions can safeguard cloud access by both IT and business users.
Language: English • Duration: 18:59 • Resolution: 1280x720
Cloud Access Security Brokers
Fudo PAM by Fudo Security
Working for the Business, not the Auditors
Atos DirX Directory
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning