• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control and Privilege
 

CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control and Privilege

on

  • 410 views

David McNeely, Director of Product Management, Centrify ...

David McNeely, Director of Product Management, Centrify
Privilege users are the great and powerful in your IT organization. But has the practice of sharing privileged credentials gone too far? Sharing of broad and unmanaged administrative rights equates to security and compliance vulnerabilities. Implementing policies for role-based access and privilege management are a start, but when it comes to securing your most valuable company assets what’s next? Attend this session and learn about a comprehensive security approach that spans best practices for managing privilege identity access from the data center to the cloud, monitoring and auditing for compliance, and a new model for securing access to systems both at the network and OS layer – all based on roles.

Statistics

Views

Total Views
410
Views on SlideShare
410
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control and Privilege CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control and Privilege Presentation Transcript