Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Register to view video.
No two privileged accounts are necessarily the same. A “privileged” account can have access to anything from slightly elevated permissions on a single workstation, to every part of your network – and anything in between. So, it makes sense that your security strategy around protecting these privileged passwords won’t be identical either. The higher the access, the more stringent the protection, right?
But how are you supposed to know which security measures are appropriate for a given privileged account without trampling on a user’s productivity?
Join industry expert and founder of Techvangelism, Nick Cavalancia, in this on-demand webinar as he walks you through:
- Identifying Risk: Which passwords should be a part of a PAM strategy
- Going Beyond the Safe: Defining the layers of protection
- Putting Protection into Practice: Matching protection with privilege while ensuring productivity