Webinar on Demand: Watching the Watchers — Guarding the Keys to the Kingdom
sponsored by Xceedium
Privilege users – those who have administrative or root access to your major server computing devices – essentially have the keys to the kingdom and while the risk posed by these users can be severe; surprisingly, it’s not a business priority for many organizations.
This webcast, featuring one of the security industry's most influential analysts and bloggers Mike Rothman, offers insight from a recent in-depth research report about the serious risks that privilege users pose and the importance of Privilege User Management (PUM). View now as Mike covers key topics including:
- What privilege users are and the risks they pose.
- Business imperatives and how they require changing privileges.
- The privilege user lifecycle.
- Solution architectural tradeoffs and integration requirements.
- And more.
(THIS RESOURCE IS NO LONGER AVAILABLE.)