
- Product presentation
- Management I
- Awareness/Phishing/Fraud
- Cloud Security
- Data security / DLP / Know-how protection
- Endpoint Protection
- Governance, Riskmanagement & Compliance
- Identity and access management
- Network Security / Patch Management
- SIEM / Threat Analytics / SOC
- Trend topic
Vision & Strategy to develop an expanded approach to PAM
Vision & Strategy to develop an expanded approach to securing identities in Privileged Access Management

- Product presentation
- Management I
Vision & Strategy to develop an expanded approach to securing identities in Privileged Access Management
Language: German
Questions and Answers: Yes
Action description
CyberArk - the global leader in privileged access management (PAM) - outlines the plan to develop an expanded approach to securing identities – one with privileged access management at its core.
Building on the recent acquisition of Idaptive, CyberArk laid out an Identity Security strategy that starts with Zero Trust and uses artificial intelligence to understand context and intent. This approach will help organizations dramatically reduce risk while providing a seamless user experience that will enable the business and support any device, application or user in a secure manner— regardless of role or location.
“In today’s mobile, digital and cloud world, all identities can become privileged under certain conditions. If not properly secured, they can open doors for attackers to execute increasingly targeted attacks,” Michael Kleist (Region Director DACH) will explain during his session. “Because of this new reality, the traditional approach to managing and securing identities has become obsolete. The identity is the new perimeter to protect. The incorporation of the Idaptive technology helps CyberArk extend its foundational strengths in privileged access management, a critical layer in delivering a security-first strategy for protecting access by a range of human, application and machine identities, and the services they consume.”
This session is designed to help attendees develop their cybersecurity expertise and provide an overview on identity based security solutions for human and technical access to machines and applications, privileged access management for business and administrative accounts as well as secure devops environments.