Safeguarding Servers

Logo
Presented by

Andrey Pozhogin

About this talk

We know servers to be an attacker’s ultimate target, but while they do store or process large amounts of sensitive data, the argument can be made that the attack surface is somewhat limited and thus more secure. True, non-IT users don’t usually have access to servers, meaning less non-qualified users making bad choices, but that doesn’t mean servers are immune to cyber risk and should be left unprotected. Today we offer a different look at server risk and server security by examining the risk resulting from the inability to gain visibility and maintain control – the risk that feeds on our limitations as humans. The more often we need to fill the technology gap with human-centric processes, the more often we need to rely on humans’ attentiveness and thoroughness, increasing the chance that an error will be made which will persist through countless audits and infrastructure changes, to be discovered and exploited by an attacker, and become a springboard that will propel the organization right into the media spotlight. Register for this webinar and walk away with an understanding of how: • Intuitive, concise, policy-based role-specific least privilege delivers visibility and control over privileged actions on Windows and Linux servers • To rapidly reduce privilege risk on servers and achieve least privilege with the QuickStart framework • To simplify sudo management on Linux and move away from thousands of lines, aliases, and wildcards which we know to be common in enterprise IT environments
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (68)
Subscribers (10260)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.