Thursday, July 16, 2009

Integrating Privileged Accounts with Existing Security Infrastructure
Published by SearchSecurity.com

While these accounts are required by the platform, a lack of accountability exists for the administrators that use them. Join The Burton Group's senior analyst Mark Diodati as he discusses the do's and don'ts around managing privileged accounts and how vendors are offering solutions for those who have root access.

View this videocast to discover:
  • The risk of leaving privileged accounts unprotected
  • Best practices that security professionals should employ
  • The differences between programmatic access and interactive access and how to decide which to choose
  • Integration of privileged accounts with other systems and technologies: Windows, SIMs, SSO, provisioning, and more

VIEW VIDEOCAST

No comments:

Post a Comment