David McNeely, Director of Product Management, Centrify
Privilege users are the great and powerful in your IT organization. But has the practice of sharing privileged credentials gone too far? Sharing of broad and unmanaged administrative rights equates to security and compliance vulnerabilities. Implementing policies for role-based access and privilege management are a start, but when it comes to securing your most valuable company assets what’s next? Attend this session and learn about a comprehensive security approach that spans best practices for managing privilege identity access from the data center to the cloud, monitoring and auditing for compliance, and a new model for securing access to systems both at the network and OS layer – all based on roles.