Security and Compliance Benefits of Endpoint Privilege Management

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

As IT applications and endpoints proliferate, and enterprises shift to hybrid IT and hybrid working models, managing end user privileges is becoming very challenging, resulting in breaches, fraud, and undetected risky behavior. Enterprises need a way of governing end users wherever they are working and protecting a growing number of endpoints. Join experts from KuppingerCole Analysts and ARCON as they discuss the security implications of hybrid IT and hybrid working, and how these risks can be mitigated. They will also explore the extent to which Endpoint Privilege Management (EPM) solutions provide the capabilities required to manage privilege-related risk and improve IT security.

Paul Fischer, Lead Analysts at KuppingerCole Analysts will explain how modern compliance and security requirements demand that EPM should offer data governance capabilities and analysis in addition to traditional capabilities such as whitelisting and blocking file execution. Anil Bhandari of ARCON will explain the role of ARCON Endpoint Privilege Management in reinforcing endpoint security and how it uses User Behavior Analysis and Data Leakage Prevention features, including Data Intellect, to build a contextual security layer.

Language: English • Duration: 57:11 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a…

Webcast

Meeting the Identity and Access Challenges in a Multi-Cloud World

Multi-cloud deployments are becoming increasingly common as organizations seek to remain competitive in the digital economy and address demands for increased remote working. But while cloud migration is enabling business success, it is not without its identity and access challenges.…

Webcast

Understanding the Privileged Access Management (PAM) Market

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold…

Webcast

A Fresh Look at the Business Value of PAM in the Work-From-Anywhere World

As businesses continue their digital transformation journey, managing privileged users has taken on a new and greater importance. Privileged Access Management (PAM) has never been more important, with increased remote working and employees increasingly getting privileged access to data and…

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00