The Problem with Privileged Access Management

Date: Wednesday, September 11th at 11:00am PT / 2:00pm ET

Data breaches have become commonplace, and despite significant investments in perimeter and endpoint security, breaches typically begin at the desktop and server layers of an organization’s IT infrastructure.  From there, it spreads through the overabundance of privileged access rights to each system and other misconfigurations and vulnerabilities attackers exploit. The problem with traditional Privileged Access Management providers is that they focus on controlling access to accounts and their passwords, not on the activities the administrators need to perform. As a result, they provide a minimal reduction of an organization’s attack surface because the accounts still exist on the endpoint and can still be compromised.

This presentation will review the gap that exists between Privileged Access Management and Privileged Activity Management, highlighting a task-based approach that provides administrators with the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed – and then returns the environment to a no access-by-default state immediately upon completion!

Join Martin Cannard, VP of Product Strategy – Privilege Access Management at STEALTHbits Technologies and learn how you can drastically reduce your threat surface!

Register now!

About the presenter:

Martin Cannard, Vice President of Product Strategy at STEALTHbits

Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to STEALTHbits, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.