About the author:
Andreas M. Antonopoulos is a senior vice president and founding partner with Nemertes Research.
In this part:
Access creep occurs when user privileges are not managed and monitored properly, and employees have access to more systems and applications than are required to do their jobs. This webcast will explain the data leak risks involved and how to limit access...
Effective role-based access control is vital for properly managing user access rights and enforcing access policies, but avoiding role sprawl can be challenging.
One of the most difficult areas of privileged user access management is avoiding access creep. John Burke covers how to keep privileged users in check.
Podcast: 5 Common Missteps with Trusted Insider Privileges
Insiders with elevated privileges are trusted with the keys to the kingdom; they're also prime targets for abuse from outsiders. In this podcast, you’ll learn five quick fixes to lessen the risk posed by trusted insiders.
Quiz: Monitoring your trusted insiders
How much have you learned about monitoring your privileged insiders? Test your knowledge in this short quiz.