Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

What is VPAM (Vendor Privileged Access Management)?

This speaker session explains the core features of VPAM and how a secure remote access solution should look like.

calendar_today Wed, 26.10.2022, 10:45 - 11:00

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Cloud Security Endpoint Protection Identity and access management Secure Homeoffice Websecurity / VPN

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

 

Vendors routinely connect remotely to your systems. The typical methodologies used for vendor access mean organizations must live with a lack of visibility and granular control over that access. Sometimes, vendors use technologies, such as VPNs (Virtual Private Networks).

How do you ensure vendors are not bringing malware into your environment, using their access inappropriately, or making errors that could introduce excessive risk?
Vendor Privileged Access Management (VPAM) enables vendor identities to securely access an organization’s assets. The role of VPAM is to extend privileged access security best practices beyond the perimeter, to all vendor access that touches the enterprise. This means VPAM applies the principle of least privilege (PoLP) to vendor remote access.


Learn more in this speaker session about:

• Vendor identity and access-related risks
• The building blocks of VPAM
• Why VPAM is more than the sum of its parts
• Core capabilities that differentiate VPAM from traditional PAM (Privileged Access Management),
• What a holistic vendor remote access solution should look like

... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.