BeyondTrust Header
  • Product Presentation
  • Technik II
  • Awareness/Phishing/Fraud
  • Endpoint Protection
  • Identity and access management

Effective security: Least Privilege as an important pillar of your PAM strategy

This BeyondTrust presentation explains practical information around Endpoint Privilege Management.

10/7/2020 1:15:00 PM – 10/7/2020 1:30:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

BeyondTrust Header
  • Product Presentation
  • Technik II

This BeyondTrust presentation explains practical information around Endpoint Privilege Management.

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

It is becoming more and more difficult to find a good balance of distribution of rights for employees and administrators. Users as well as IT administrators should be given sufficient authorizations to carry out their work productively, while at the same time minimizing the IT security risk and protecting sensitive data and systems. Attackers are often one step ahead of organizations. Even those with the most comprehensive IT security systems and control mechanisms fear that an attacker could discover and exploit a vulnerability.

This talk explains practical tools that companies can use to implement industry-recognized best practices for endpoint privilege management and basic security controls to protect IT systems and data from the most common attacks. It contains tips for successfully implementing a Least Privilege Strategy that will help you get rid of unnecessary permissions. Likewise, rights can be increased on multiple platforms and networked devices without affecting end-user productivity.

read more

Speaker