CyberArk Header deutsch
  • Product Presentation
  • Management I
  • Awareness/Phishing/Fraud
  • Cloud Security
  • Data security / DLP / Know-how protection
  • Endpoint Protection
  • Governance, Riskmanagement & Compliance
  • Identity and access management
  • Network Security / Patch Management
  • SIEM / Threat Analytics / SOC
  • Trend topic

Vision & Strategy to develop an expanded approach to PAM

Vision & Strategy to develop an expanded approach to securing identities in Privileged Access Management

10/6/2020 3:30:00 PM – 10/6/2020 3:45:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

CyberArk Header deutsch
  • Product Presentation
  • Management I

Vision & Strategy to develop an expanded approach to securing identities in Privileged Access Management

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

CyberArk - the global leader in privileged access management (PAM) - outlines the plan to develop an expanded approach to securing identities – one with privileged access management at its core.
Building on the recent acquisition of Idaptive, CyberArk laid out an Identity Security strategy that starts with Zero Trust and uses artificial intelligence to understand context and intent. This approach will help organizations dramatically reduce risk while providing a seamless user experience that will enable the business and support any device, application or user in a secure manner— regardless of role or location.
“In today’s mobile, digital and cloud world, all identities can become privileged under certain conditions. If not properly secured, they can open doors for attackers to execute increasingly targeted attacks,” Michael Kleist (Region Director DACH) will explain during his session. “Because of this new reality, the traditional approach to managing and securing identities has become obsolete. The identity is the new perimeter to protect. The incorporation of the Idaptive technology helps CyberArk extend its foundational strengths in privileged access management, a critical layer in delivering a security-first strategy for protecting access by a range of human, application and machine identities, and the services they consume.”
This session is designed to help attendees develop their cybersecurity expertise and provide an overview on identity based security solutions for human and technical access to machines and applications, privileged access management for business and administrative accounts as well as secure devops environments.

read more

Speaker