Hi [[ session.user.profile.firstName ]]

Controlling Privileged User Access: Six Practical Best Practices

Studies show that malicious insider fraud costs an organization even more time and money to recover from than a denial of service or web-based attack. Are you still relying on sudo, password vaulting, or monitoring to control privileged user access to your Unix, Linux and Windows servers and desktop
Studies show that malicious insider fraud costs an organization even more time and money to recover from than a denial of service or web-based attack. Are you still relying on sudo, password vaulting, or monitoring to control privileged user access to your Unix, Linux and Windows servers and desktops? If so, you may be leaving yourself wide open to a security breach, which will cost your organization, on average, $8.9M dollars.

Join McAfee and FoxT to discover the latest best practices and recent innovations for privileged access management. Topics covered include:

• Granular authorization: Enforcing privileged access down to the command level
• Best practices for management and granular enforcement of SSH user and host keys
• Automating user account creation and removal across diverse systems
• How to streamline audits and achieve compliance with automated logging and reporting
Recorded Feb 12 2013
41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and Fox Technologies
Presentation preview: Controlling Privileged User Access: Six Practical Best Practices
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Controlling Privileged User Access: Six Practical Best Practices
  • Live at: Feb 12 2013 6:00 pm
  • Presented by: McAfee and Fox Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this