Interview

How Can Privileged Access Management Help Securing the Enterprise?

Show description
Speaker
Lead Analyst
KuppingerCole Analysts AG
Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...
View profile
Playlist
KuppingerCole Videocasts
Interview
Privileged Access Management from a CISO Perspective
Feb 16, 2021

Privileged user accounts are significant targets for attacks as they have elevated permission, access to confidential data and the ability to change settings. And if compromised, the amount of damage to an organization can be disastrous. No wonder that this is on the mind of our chief information security officers. Join our CEO Berthold and Rob Edmondson, Technology Strategist at Thycotic in this conversation!

Interview
Privileged Access Management Buzzwords
Oct 07, 2020
Interview
Dark Web Monitoring - CYFIRMA on an Undercover Mission
Jul 14, 2022

With CYFIRMA's products, you can take a look at your business through the eyes of a cybercriminal. But to know what they know, they need to take steps into the dark side of the World Wide Web. Osman interviews Kumar Ritesh from CYFIRMA about their work on the Dark Web.

Video
IT Service Management als SaaS: Effiziente Prozesse und optimales Serviceerlebnis
Jun 07, 2023

Entdecken Sie die Bedeutung von IT Service Management und wie es Ihr Unternehmen voranbringen kann. In diesem Video teilen Bert Kondruß von der USU AG und Martin Kuppinger wertvolle Einblicke über die Lösungen von USU und den Mehrwert von Software as a Service (SaaS). Optimieren Sie Ihre IT-Services und erreichen Sie Ihre Unternehmensziele schneller.

Interview
Accelerate your Identity's Digital Transformation
Apr 13, 2021

Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.

Interview
Data Security in the Cloud
Dec 02, 2020

Join our Analyst Mike Small and Paul Hampton, Product Manager at Thales Security as they talk about the importance of securing data in the cloud.

Interview
The Future of IAM is Automated
Nov 05, 2020

Interview with Paul Trulove, Chief Product Owner, SailPoint

Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
Apr 29, 2021

The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we be doing about their security?

Join Thom from SentinelOne and Alexei as they discuss what AI and IoT really are to learn how many IoT devices Alexei has at home and how long we have to wait until "The Terminator" will be al real thing.

Interview
Identity and Access Management
Oct 07, 2020
Video
The Evolution of PAM: Why We'll Have to Rethink Access Management
Aug 24, 2023

Dive into the world of Privileged Access Management (PAM) and its significance in today's rapidly evolving security landscape with Lead Analyst Paul Fisher and Saviynt's Chris Owen. They explore the challenges organizations face, customer expectations, and the need to reset aspirational goals. Discover the shift towards zero standing privilege, just-in-time access, and the convergence of identity and PAM solutions. Learn about the future of PAM, the role of cloud infrastructure entitlement management, and how user experience is becoming a critical factor in PAM adoption.

Video
Why You Shouldn’t Just Use IGA for Third Party Access Management
Oct 05, 2023

Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity Governance and Administration (IGA). Discover the evolving landscape of corporate Access Governance, the challenges of securing third-party relationships, and the benefits organizations can gain from effective third-party governance. Learn about the crucial role of AI and automation and gain valuable insights to help your organization stay ahead in managing third-party risks and access.

Interview
How CYFIRMA Puts Threat Intelligence Into Practice
Jul 05, 2022

Do you know what information about your company is out there and can be used by cybercriminals? What are they interested in? Are they actually targeting your company and planning to exploit it? These are many questions that you may want to consider answering. After all, part of a good defense strategy is knowing your enemy. Kumar Ritesh wanted to solve this challenge and founded CYFIRMA to help others with a complete, comprehensive view, on one platform. Learn more about how they help you look through the eyes of cybercriminals.