All companies of varying sizes have privileged users with accounts that give them the ability to critically affect how the company's entire system is running. Privileged access management should be an important ongoing process in every enterprise, as it can prevent user accumulation of privileges, promote the security principle of least privilege and impede the abuse of user credentials. Learn from Michael Cobb, founder of Cobweb Applications, how to keep user roles and privileges aligned and what checks and balances prevent privilege abuse and data breaches.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about privileged access management. Passing the quiz earns you one CPE credit from (ISC)2.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Secure privileged user management in the enterprise
Cobb explains the steps your enterprise can take to get a handle on privileged access management, discusses the ways to prevent privileged credential abuse from both inside and outside the company and suggests methods of increasing security around trust user accounts.
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading
Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Continue Reading
Users with privileged accounts have the ability to make critical changes to your enterprise system. Find out how to control trusted users and prevent malicious actions. Continue Reading