No two privileged accounts are necessarily the same. A “privileged” account can have access to anything from slightly elevated permissions on a single workstation, to every part of your network – and anything in between. So, it makes sense that your security strategy around protecting these privileged passwords won’t be identical either. The higher the access, the more stringent the protection, right?

But how are you supposed to know which security measures are appropriate for a given privileged account without trampling on a user’s productivity?

Join industry expert and founder of Techvangelism, Nick Cavalancia, in this on-demand webinar as he walks you through:

Photograph of Nick Cavalancia

Nick Cavalancia, Founder/Chief, Techvangelism

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Nick has attained industry certifications including MCNE, MCNI, MCSE and MCT and was once accused at TechEd of "not having enough digits" in his MCP number (which only has 5). He has authored, co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies and has spoken at many technical conferences on a wide variety of topics.

Previously, Nick has held executive marketing positions at ScriptLogic (acquired by Quest, now DELL Software), SpectorSoft and Netwrix where he was responsible for the global messaging, branding, lead generation and demand generation strategies to market technology solutions to an IT-centric customer base.

Prefers reduced motion setting detected. Animations will now be reduced as a result.