Chris Owen, Director, Product Management at Centrify
According to recent research by the Identity-Defined Security Alliance (IDSA), 59% of organizations say that cloud applications are driving a 5X increase in the number of identities over the past 10 years. And, over the past two years, 79% have had an identity-related breach.
Digital transformation has massively expanded the threatscape, as modern technologies like cloud, DevOps, containers, microservices and more are creating an explosion in the number of machine identities in the IT estate. Now more than ever, it’s vital to take an identity-centric approach to securing privileged access to resources in on-premises, hybrid, and multi-cloud environments.
In this webinar from Centrify, an IDSA member, we’ll explore:
1. How organizations have evolved their use of cloud
2. How Privileged Access Management (PAM) solutions have transformed to support new methodologies and tooling
3. The differences between a shared account approach and identity-centric approach to PAM
4. 6 key challenges organizations face for DevSecOps when it comes to cloud, and how to solve them
Digital transformation is at the heart of organizations embracing cloud technologies. As we make this shift to the cloud, our approach to Privileged Access Management (PAM) needs to be re-defined in order to protect access to the cloud and workloads within the cloud.
Join our webinar as we take things back to the basics; taking a look at what Cloud PAM really is, and how it can enable you to reduce risk within your environment. We’ll look over the following key areas:
- The adoption of cloud and multi-cloud
- Protecting access to the cloud and workloads in the cloud
- What is cloud PAM?
- The different types of cloud PAM solutions
- Key Gotcha’s and things to watch out for
With so many names, acronyms and vendor capabilities, understanding PAM can be a challenge.
Join us for this live webinar to learn what Privileged Access Management is and how PAM can enable you to reduce risk within your environment. We will review over the following key areas:
- What is Privileged Access Management
- Key objectives we see in every PAM project
- The history and evolution of PAM
- Key "gotchas" and things to watch out for
- The PAM maturity model
Enterprise organisations now exist in a mixed hybrid environment, with workloads running in the cloud and on prem, either on Windows or Linux. Traditionally this is a headache for system administrators having to manage multiple credentials across Active Directory and local Linux accounts.
Simplify and Centralise with Centrify by allowing users to logon with their AD credentials and have MFA enforced on a Linux/Unix host.
Granular controls allow privilege elevation down to the command executed with MFA enforcement ensuring identity is verified at each stage.
This webinar will cover these aspects and a demonstration on how Centrify can help you achieve this.
Cloud adoption is changing the privileged access management landscape. PAM tools were originally designed to protect assets within our data centre, within our directory, physical and virtual servers under our control and applications under our management. As enterprise organisations are adopting public cloud with not just one vendor, often multiple vendors, our challenge of securing privileges and reducing risk becomes more complex. Join us for this webinar where we’ll discuss some of the challenges with privilege management in the cloud and how an identity-centric approach enables you to reduce your risk of exposure.
Marco Zhang, Director of Systems Engineering APJ at Centrify
Emerging technologies fuelling digital transformation are reshaping the enterprise IT environment. As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.
Underlying the foundation of digital transformation are privileged access controls, which ensure that only authorized individuals, machines, or services are permitted to access the right resources, at the right time, for the right reasons. Centrify enables digital transformation at scale, modernizing how organizations secure privileged access across hybrid and multi-cloud environments by enforcing Identity-Centric PAM based on Zero Trust principles.
The webinar will cover:
•The new security perimeter
•PAM challenges in multi-cloud
•Critical use cases for multi-cloud
•Demonstration
Die Anzahl der Einbrüche in Unternehmensnetze ist in den letzten Jahren explodiert. Organisationen müssen erkennen, das Perimeter basierte Sicherheit gegen die größte Bedrohung, der Missbrauch von privilegierten Konten, nicht mehr ausreichenden Schutz bietet. Organisationen, die ein PAM System nutzen und nur Passwörter in einem Tresor oder Password Manager verwalten, laden durch fehlende Funktionen zum Missbrauch ein.
Die Themen des Webinars:
•Zentrale Herausforderungen eines PAM Tools
•Was ist “Just-In Time PAM”
•Just-In-Time Konzepte
•Demonstration der Centrify Konzepte.
Dr. Torsten George, Cyber Security Evangelist at Centrify, Samer Jadallah Vice President, KSA & Bahrain at StarLink
In an era when cyber-attacks have become common occurrences, it's vital for the Saudi Arabian Banking, Financial Services, and Insurance (BFSI) industry to improve its cyber resilience. In this context, the SAMA Cyber Security Framework offers a comprehensive set of best practices that are quite prescriptive by nature. However, becoming and staying compliant in today’s dynamic threatscape is often challenging.
Don’t miss out on this webcast to learn how to address today’s #1 attack vector ― privileged access abuse ― and surpass SAMA’s regulatory mandates.
The webinar will cover the following topics:
• SAMA Cyber Security Framework Overview
• Current Market Drivers
• The Role of Privileged Access Management (PAM) in Cyber Security
• How to Meet SAMA IAM Requirements with Identity-Centric PAM
Register for access to the live or on-demand webinar after the live event.
As organisations embrace cloud technologies, there is a rise in multi-cloud strategies where more than one cloud provider is being used. This can lead to more complexity around managing security and compliance if a tailored strategy around IAM and PAM is not used.
Centrify Privileged Access Service provides a cloud-first platform that can address your business needs in these challenging new environments.
The webinar will cover:
•What is (multi-)cloud, and what organisations learnt from their first attempts at using it?
•What cloud vendors propose, and how this is insufficient
•The Centrify Privileged Access Service platform
•2 simple use case demonstrations
Frank Leavis, Senior Systems Engineer, EMEA chez Centrify
Ce webinaire couvrira les points suivants:
- Qu'est-ce que le (multi) cloud et quels enseignements les organisations ont-elles tirées de leurs premières tentatives d'utilisation?
- Ce que proposent les fournisseurs de Cloud et pourquoi cela est insuffisant
- La plateforme Centrify Privilege Access Service
- 2 démonstrations de cas d'utilisation simples
Chris Owen, Director of Product Management, Centrify.
Join this webinar to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:
•Enforcing MFA
•Using host-based auditing
•Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
•Understanding container technologies
•Major risks of container technologies
•How Centrify Zero Trust Privilege helps to address these risks
•Use Case Demonstrations
Chris Owen, Director of Product Management, Centrify
Join this webinar to find out:
• How Password Vaults have evolved
• The challenges in using today’s Password Vault solutions
• How Centrify enables customers to operate without the overhead of legacy Vault solutions
•The Zero Trust Privilege Management Approach
Chris Owen, Director of Product Management, Centrify
Join this webinar to find out:
•How Password Vaults have evolved
•The challenges in using today’s Password Vault solutions
•How Centrify enables customers to operate without the overhead of legacy Vault solutions
•The Zero Trust Privilege Management Approach
Presenter – Chris Owen, Director of Product Management, Centrify
Join this webinar to find out:
- What is credential tiering?
- Why is credential tiering a recommended control?
- How to mitigate the risk of credential-based attacks
- Centrify’s Zero Trust Privilege Management Solution
Time Steinkopf, CEO Centrify, Andy Smith, VP Marketing, Centrify
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.
Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
Chris Owen, Director of Product Management, Centrify
Join this webinar to find out:
•What is credential tiering?
•The impact of credential-based attacks on users
•How to mitigate the risk of credential-based attacks
•How to effectively implement credential tiering using Centrify’s Zero Trust Privilege
Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on Privilege Access Management. As organisations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and compliance postures are strengthened, and machines are empowered to defend themselves against cyber-threats.