Hi {{ session.user.profile.firstName }}

Controlling Privileged User Access: Six Practical Best Practices

Manage webcast
McAfee and Fox Technologies
Studies show that malicious insider fraud costs an organization even more time and money to recover from than a denial of service or web-based attack. Are you still relying on sudo, password vaulting, or monitoring to control privileged user access to your Unix, Linux and Windows servers and desktops? If so, you may be leaving yourself wide open to a security breach, which will cost your organization, on average, $8.9M dollars.

Join McAfee and FoxT to discover the latest best practices and recent innovations for privileged access management. Topics covered include:

• Granular authorization: Enforcing privileged access down to the command level
• Best practices for management and granular enforcement of SSH user and host keys
• Automating user account creation and removal across diverse systems
• How to streamline audits and achieve compliance with automated logging and reporting
Feb 12 2013
41 mins
Controlling Privileged User Access: Six Practical Best Practices
More from this community:

IT Security

  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Controlling Privileged User Access: Six Practical Best Practices
  • Live at: Feb 12 2013 6:00 pm
  • Presented by: McAfee and Fox Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this