Hi [[ session.user.profile.firstName ]]

Privileged accounts: the most powerful backdoor used by hackers

Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
Recorded Apr 27 2017 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Grant Burst and Chad Carter
Presentation preview: Privileged accounts: the most powerful backdoor used by hackers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Industrie 4.0 : Wie sie Zugriffe schützen (DEUTSCH) Recorded: Aug 1 2017 30 mins
    Markus Westphal, WALLIX
    Zeigen wir Ihnen, wie die Lösung WALLIX Bastion die privilegierten Zugriffe und Accounts der industriellen Kontrollsysteme und der SCADA-Systeme schützen und deckt die Anfälligkeiten auf, die bei der Verknüpfung zwischen den Kontrollsystemen, den ITUmgebungen, dem Internet und den Remote-Benutzern auftreten.
  • Privileged accounts: the most powerful backdoor used by hackers Recorded: Apr 27 2017 47 mins
    Grant Burst and Chad Carter
    Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
The secured BBC news!
Reach regulatory compliance and secure your strategic assets by protecting critical systems and sensitive data with Privileged Access Management! As part of WALLIX’s commitment to protect organizations’ success and renown against the cyber threats they are facing, we welcome you to the Bastion Broadcast Channel! Subscribe and join us for educational, participative, and engaging webinars and talks about the best ways to tackle today’s cybersecurity challenges.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged accounts: the most powerful backdoor used by hackers
  • Live at: Apr 27 2017 2:00 pm
  • Presented by: Grant Burst and Chad Carter
  • From:
Your email has been sent.
or close