Hi [[ session.user.profile.firstName ]]

Privileged Access & Activity Management:Challenges and Solutions

With the rise of large data centers, network operations centers and application maintenance outsourcing, the problem for managing unrestricted admin access has come to the forefront. Typically, in all of the these environments, teams of administrators are required to manage and maintain a large number of systems, network devices or applications using highly powerful access IDs called privileged IDs.

These IDs are so powerful that the person using them can do almost anything on the target – reconfigure, restart, install new systems, remove logs and even remove existing systems – without facing any restriction. To make matters worse, these IDs are almost always shared among the administrator teams, causing accountability concerns and regulatory non compliance.

Privileged ID Management aims to facilitate the business by providing a secure yet easy to use solution to these requirements rather than just relying on trust on the administrators. Privileged ID Management provides well integrated solutions for accountable and usable User ID Management, Controlled access and Activity Monitoring.


Webinar Highlights
•The concept of privileged access – the risks associated with this access and activity
•Why this is important for all enterprises (especially telecom companies)
•What kind of controls are needed
•What kind of solutions are available
•How to plan for a solution
Recorded Jul 28 2011 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mr. Ankush Kapoor, Practice Head (IAM), Aujas
Presentation preview: Privileged Access & Activity Management:Challenges and Solutions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Data Leakage Prevention - A close look at DLP Technology and Beyond Recorded: Oct 19 2011 64 mins
    Chandra Prakash Suryawanshi - Practice Head Information Risk Advisory Services Aujas
    There are multiple technologies available for implementing a Data Leakage Prevention project. But how to choose the right technology? What are the critical factors to evaluate before buying a DLP tool.

    This webinar talks about Data Leakage Technology and looks at the DLP capability and popular tools with respect to Gartner’s magic quadrant.

    The presentation will cover some of limitations of the DLP technology and approach for successful implementation to address data leakage issues. Finally it will summarize on how an enterprise should plan its DLP strategy.

    Webinar Highlights

    •Data Protection – Need and Concepts
    •A Quick look at DLP Technology- Gartner’s Magic Quadrant
    •Limitations of DLP tool
    •Understanding the Risk and Exposure Points
  • Data Leakage Prevention - A close look at DLP Technology and Beyond Recorded: Sep 29 2011 63 mins
    Chandra Prakash Suryawanshi - Practice Head Information Risk Advisory Services Aujas
    There are multiple technologies available for implementing a Data Leakage Prevention project. But how to choose the right technology? What are the critical factors to evaluate before buying a DLP tool.

    This webinar talks about Data Leakage Technology and looks at the DLP capability and popular tools with respect to Gartner’s magic quadrant.

    The presentation will cover some of limitations of the DLP technology and approach for successful implementation to address data leakage issues. Finally it will summarize on how an enterprise should plan its DLP strategy.

    Webinar Highlights

    •Data Protection – Need and Concepts
    •A Quick look at DLP Technology- Gartner’s Magic Quadrant
    •Limitations of DLP tool
    •Understanding the Risk and Exposure Points
    •Approach to protect data – Regulated, Business and Transaction
  • Privileged Access & Activity Management:Challenges and Solutions Recorded: Jul 28 2011 60 mins
    Mr. Ankush Kapoor, Practice Head (IAM), Aujas
    With the rise of large data centers, network operations centers and application maintenance outsourcing, the problem for managing unrestricted admin access has come to the forefront. Typically, in all of the these environments, teams of administrators are required to manage and maintain a large number of systems, network devices or applications using highly powerful access IDs called privileged IDs.

    These IDs are so powerful that the person using them can do almost anything on the target – reconfigure, restart, install new systems, remove logs and even remove existing systems – without facing any restriction. To make matters worse, these IDs are almost always shared among the administrator teams, causing accountability concerns and regulatory non compliance.

    Privileged ID Management aims to facilitate the business by providing a secure yet easy to use solution to these requirements rather than just relying on trust on the administrators. Privileged ID Management provides well integrated solutions for accountable and usable User ID Management, Controlled access and Activity Monitoring.


    Webinar Highlights
    •The concept of privileged access – the risks associated with this access and activity
    •Why this is important for all enterprises (especially telecom companies)
    •What kind of controls are needed
    •What kind of solutions are available
    •How to plan for a solution
  • Using the “Secure by Design” model for Software security Recorded: Jun 23 2011 63 mins
    Mr. Sasi Kumar, Practice Head (SDL), Aujas
    Security is the buzz word in today's software industry but how seriously is it considered while developing the software applications? Software security is largely overlooked since there is more focus on functionalities, performance and meeting deadlines. No wonder there are so many insecure applications developed in the first place.

    Software should be very secure and also user friendly. It is assumed that we sacrifice on performance and user friendliness by including security controls in applications. Using the reactive security based model of resolving vulnerabilities obviously leads to patches being applied to fix software bugs. But how do you design Secure and user friendly applications in the first place?

    How can the outcome of secure software development process be robust, user friendly and deliver high performance? Security is not a complex thing to integrate in the software development life-cycle. This needs to be acknowledged and accepted by the Business analysts, Architects, Designers, Developers and Testers. The presentation is focused upon key issues and discusses how to build secure software with an optimal and practical design strategy.

    Webinar Highlights:
    •Proactive software security by design
    •How to design secure software
    •How to implement Secure SDLC
    •Increase in ROI by secure development
    •Balance performance, security and usability of system
  • Data Loss Prevention - From Strategy to Execution Recorded: May 26 2011 62 mins
    Chandra Prakash Suryawanshi
    How much protection is enough for confidential and sensitive data of the organization? What about complying with industry regulations and mitigating data leakage risks during rapid adoption of Cloud, Social, and Mobile media in enterprises?

    Organizations are now exposed to various threats and look at technology as a solution to them. Though technology is a phenomenal help, but it has its own set of scope without a proper strategy and execution plan. The presentation is focused upon these issues and discusses the necessary steps to implement a optimal and practical Data Loss Prevention (DLP) strategy. It starts off by looking at what’s driving data protection, the consequences of data loss and how it can be comprehensively tackled using best practices as a solution. At the end it concludes to the practical approach to holistically address the data protection problem effectively. Various security controls, practices, strategies and other related concerns are shared in this presentation giving a holistic view of managing data security at various stages.

    Webinar Highlights:
    • What drives Data Protection
    • What technology can and cannot do?
    • Protecting what matters the most?
    • Setting the Management Expectation- From Strategy to Execution
    • Clearing the confusion- Approach to holistically address the data protection “big problem”
Information Risk Management
Aujas

Aujas is a Global Information Risk Management (IRM) company providing consulting and technology life-cycle services in the area of information risk. The company works with enterprises globally with its presence in Asia, US, Europe and Middle East regions. Aujas service portfolio includes Information Risk advisory services, Secure Development Life-cycle services, Identity and Access Management services, Managed Information Risk services, Vulnerability Management services and Converged Security services.

Headquartered at Bangalore, Aujas has more than 100 satisfied clients globally and it has executed over 200 projects in 15 countries within 3 years from its inception. The company aims to help enterprises to manage information risks and enhance value of information through innovation and excellence.

For more information please visit www.aujas.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged Access & Activity Management:Challenges and Solutions
  • Live at: Jul 28 2011 11:00 am
  • Presented by: Mr. Ankush Kapoor, Practice Head (IAM), Aujas
  • From:
Your email has been sent.
or close