Gartner Webinars

Trends and Topics on Virtually Every Area of IT

Safeguard Critical Systems With Privileged Account Management

ON-DEMAND VIDEO WATCH ANYTIME, ANYWHERE

Discussion Topics:

  • What privileged account vulnerabilities attackers most commonly exploit
  • How to I shore up access controls for remote and third-party privileged users
  • The architectural considerations for a risk-aware PAM implementation
  • How PAM tools fit into my overall security and IAM architecture

The need to govern and secure privileged access has grown dramatically as today's digital businesses push resources to the cloud and outsource critical business functions to third parties. In this video, we discuss how organizations can implement a risk-based approach to prioritize and architect a privileged account management (PAM) implementation.


Hosted by:

Lori Robinson

Research VP

SHARE

ON DEMAND