"Your organization likely leverages one or more vendors to support infrastructure, scale computing resources, provide managed IT services, or other areas to assist your business with daily operations. While beneficial, to be sure, there are a number of consistent security challenges that characterize vendor access:
1. Vendor credential sharing, i.e. missing vendors or “always logged on” vendors
2. Hardware replacement, regarding token breaks or corporate-issued laptops
3. Operational overhead resulting from managing multiple systems for vendor access & onboarding.
So, how do you navigate these challenges with your vendors and input the proper levels of privileged access management (PAM)?
Tune into this on-demand BrightTALK webinar to find out, wherein our panel of experts shares vendor PAM best practices and Elliot Jefferson, Identity and Access Team Lead for Northwestern Medicine, gives his perspective from the vendor side of PAM. "