Privileged User Monitoring as Key Element of Counter-Measures

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. Attackers are trying to gain access to privileged accounts, hijacking these. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions.

Language: English • Duration: 57:59 • Resolution: 1280x720

Learn more about this webinar