It is becoming more and more difficult to find a good balance of distribution of rights for employees and administrators. Users as well as IT administrators should be given sufficient authorizations to carry out their work productively, while at the same time minimizing the IT security risk and protecting sensitive data and systems. Attackers are often one step ahead of organizations. Even those with the most comprehensive IT security systems and control mechanisms fear that an attacker could discover and exploit a vulnerability.
This talk explains practical tools that companies can use to implement industry-recognized best practices for endpoint privilege management and basic security controls to protect IT systems and data from the most common attacks. It contains tips for successfull ...