Vendors remotely accessing company assets are vital to a business’s success but pose a growing threat that is increasingly complex for security professionals to manage. With an average of 182* vendors accessing a company’s network every week, companies urgently need to address the growing risks vendor access presents without compromising productivity or regulatory compliance.
This webinar will discuss the specific risks vendor access presents including the impact of unsecure remote access pathways and the lack of granular access controls and audit capabilities. It will demonstrate how the simplified infrastructure of BeyondTrust’s Privileged Remote Access solution enables rapid deployment, quickly removing these threats and allowing vendors to securely access corporate assets without impacting performance and compliance demands, delivering quick time to value to your organisation.
You will also have the opportunity to question the BeyondTrust team directly in a Q&A session.
*2019 Privileged Access Threat Report
With more than eight years’ experience of international consultancy and training delivery, Ian has worked with Fortune 500 and FTSE 100 organisations, helping them to achieve compliance and regulatory pressures via user friendly security protocols. He has over seven years’ experience with Endpoint Privilege Management solutions and helped hundreds of organisations to enable least privilege across their user base. His specialist sectors include Finance and Consultancy, Defense, Pharmaceutical, Public Sector and Commercial markets.
Tom Scase is a Senior Solutions Engineer with over 15 years’ experience across all verticals. Tom has turned a hobby in computing and hacking into a career. Specializing in Endpoint Security and End-User Computing across Windows, MacOS, and mobile devices, he leverages his previous experience working as 1st, 2nd, and 3rd line support and in Technical Account Management. Tom brings a broad perspective and understands the challenges modern IT departments and security teams are up against to in order to protect their users and businesses from ever-evolving threats.