...
European Identity & Cloud Conference 2014
13.05. – 16.05.2014, Munich, Germany

Moderator:

IAG & PxM – Integrated View

15.05.2014 11:00-12:00

Securing Elevated Privileges: Integrating Access Governance and Privilege Management

Why these two areas can’t be handled separately. How to set up guidelines, processes, and organization to manage privileged accounts through their whole life cycle. How to integrate technically.

Early Check-in with Identity and Access Governance Best Practices

Leadership Compass: Privilege Management

15.05.2014 12:00-13:00

Securely Managing Privileged Users: Selecting the Solution that fits to your Needs

The KuppingerCole Leadership Compass provides a thorough and comprehensive analysis of the product offerings in a particular market segment. KuppingerCole compares these offerings based and identifies the overall leaders, product leaders, market leaders, and innovation leaders. Furthermore, KuppingerCole provides in-depth analysis per product and additional analytics that show the strengths of products for various customer challenges. KuppingerCole Leadership Compass documents help customers in finding their path through the markets and identifying the products they should put on their shortlists. In this session, Peter Cummings and Rob Newby will provide an overview of the Privilege Management market based on the current KuppingerCole Leadership Compass.

This Leadership Compass session will providean overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc1. Technologies typically support Privilege Management as a password vault approach, with some form of proxy/gateway to record RDP Sessions, while logging key strokes for SSH based connections. This approach is regarded as standard, but we are now seeing many vendors being more innovative due to the migration towards the new platforms (Cloud, Mobile, Social) which requires privilege management for many more environments.

The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start with implementing a standard infrastructure for Privilege Management. This KuppingerCole Leadership Compass provides an overview of the leading vendors in that market segment.

Besides the established vendors providing complete Privilege Management product portfolios, there are some smaller vendors with interesting offerings as well as specialists focusing purely on individual parts of the Privilege Management market. 

Mitigating Targeted Attacks with Privileged Account Analytics

Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics.

In this panel, we will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these is an important element in security strategies. We will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.