Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

Zero standing privileges: how user privileges become ephemeral

Standing privileges are unnecessary! Privileged access should only be granted when necessary and for a limited period of time. We show how!

calendar_today Wed, 26.10.2022, 10:15 - 10:30

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Data security / DLP / Know-how protection Endpoint Protection Governance, Riskmanagement and Compliance Identity and access management

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


Why take the risk of always-on privileged accounts when you can eliminate those "always-on" privileges with Zero Standing Privileges?
Privileged Access Management (PAM) solutions aim to solve a critical problem: enabling secure privileged access to data, systems and other IT resources.
Traditional PAM approaches have focused on either managing access to privileged account passwords or temporarily escalating privileges to control when users with administrative privileges can act (see sudo in the Linux environment).
However, attempting to tightly control privileged access using such techniques ignores the greater security risk. When privileged accounts are persistent, they are vulnerable to misuse by their respective users and hijacking by attackers. In fact, admin credentials are a prime target for hackers as they grant privileged access to vital IT resources.
A modern PAM approach is to do away with persistent privileges and replace them with a policy-driven process that grants privileged access only when needed and fine-tuned to the task at hand. In other words: just-in-time (JiT) privileged access with just enough privileges.
Our presentation shows how this can be done.

... read more

Language: German

Questions and Answers: No

Speaker

show more

Products

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.