Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreFind out more about our extensive partner & integration network.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Michael Byrnes, Director, Solutions Engineering; Layale Hachem, Solutions Engineer
The practice of removing admin rights from end users has become quite popular among different organizations not only because it helps Information Technology teams comply with security regulations, but also because it drastically reduces the attack surface.
Despite the enforcement of the Least Privilege concept, most organizations are still at risk! Why are privileged accounts still considered a threat even after removing admin rights from end users, and how can organizations properly enforce the least privilege concept?
Watch this webinar to get these questions answered. Our agenda will cover:
Michael Byrnes is the Director, Solutions Engineer iMEA for BeyondTrust. He has acquired a wealth of cyber security experience in a number of engagements over the last 10 years with a diverse set of IT companies across the Middle East. Thanks to his various roles as a security consultant, a systems engineer or within pre-sales, he gained extensive expertise in network and information security, architecture design and virtualization. Within his current position at BeyondTrust, Michael manages the solution engineers’ team in the Middle East, India and Africa. With his group, he engages and advises partners, customers and prospects in their Privileged Access Management (PAM) strategy to secure and manage their entire universe of privileges.
Layale Hachem is a Solutions Engineer at BeyondTrust. Before joining the company, she has worked 4 years at a cybersecurity-focused distributor in the Middle East as a Systems Engineer, a Product Specialist and a Solutions Engineer Team Leader. Over her previous and current professional roles, she has been able to build a comprehensive knowledge of the IAM and data protection fields. She has gained an extensive knowledge and has specialized on Endpoint Privilege Management, Privileged Access Management, network security and Endpoint Detection and Response.