06.05.2015 17:30-18:30

European Identity & Cloud Conference 2015
Combined Session


Privilege Management Use Cases

In this session,we will walk through major use cases for Privilege Management. Which are the most common use cases, what to look at in particular and which specific features to stress-test in a PoC?

The Snowden Effect: Why seeing is believing

We pride ourselves on being proactive in dealing with external threats to our data. But why is our approach to the insider threat so much more reactive and forensic? Have we considered that being able to actively monitor and take action where privileged users behaviour is identified as risky might help us prevent this kind of data loss? Thinking beyond log management to identify behaviour.

Key Takeaways:

  • Understanding the benefits of real-time monitoring.
  • Considering which parts of their organization are most and risk and might benefit from real-time monitoring.
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.