Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –pm with Charles Kolodgy, Analyst - Accelerated Strategies Group; Mitch Ashley, CEO - Accelerated Strategies Group
Organizations are challenged to automate more and more processes as they embark on digital transformation projects. This acceleration in the deployment of automation is also introducing new security risks and expanding the attack surface. How can RPA tools manage identity and authentication models, privileges, reused passwords, and credentials? These are exactly the assets cybercriminals want to acquire.
Watch this on-demand webinar with 3 security and application experts, Charles Kolodgy, Mitchell Ashley, and Jason Jones who will examine how to bolster RPA security, how critical secrets within RPA apps can be protected, security challenges with RPA, and potential solutions. Our experts will also cover how API access tokens, credentials, certificates, and cryptographic keys are embedded within applications and potential pitfalls associated with application identity and authorization. Learn how BeyondTrust can help discover, manage, audit, and monitor privileged accounts to enable a secure approach for your RPA strategy.
Attendees learned:
Charles J. Kolodgy is a security strategist, visionary, forecaster, historian, educator, and advisor who has been involved in the cyber security field for over 25 years. He is an Analyst with Accelerated Strategies Group and Principal at Security Mindsets. His views and understanding of information and computer security were shaped during his years at the National Security Agency. During that time he held a variety of analyst and managerial positions within both the information assurance and operations directorates. Following NSA is was a a Research Vice President covering security markets for IDC and then a Senior Security Strategist for IBM Security. Over the years he has identified market trends and authored numerous documents to explain market realities and has been a speaker at many security conferences and events, including the RSA Conference, CIO Conference, CEIG, and IANS. He has been widely quoted in the media. He is best known for naming and defining the Unified Threat Management (UTM) market which continues to be one of the strongest cyber security markets with vendor revenue of $3 billion per year. He has been a leading analyst on software security, encryption, and the human element.
Mitchell Ashley is a renowned strategist and technology executive, who has led successful IT, SaaS, and cybersecurity transformations. Mitch serves as CEO & Managing Analyst of Accelerated Strategies Group where he is supported by a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.
Jason has been building business applications and software products going on 15 years. With a background in Development, QA, Product Management, and wearing as many hats as possible at a medical startup, he has extensive experience with the entire product lifecycle. Jason has been working on BeyondTrust products for the past 10 years and has a primary focus on our Privileged Password and Session Management solutions.