Combine the best of Session Management and Credential Management solutions at a new, incredible value!
Learn More Learn MoreGet a closer look inside the BeyondTrust identity & access security arsenal.
Learn More Learn MoreFind out how customers & analysts alike review BeyondTrust.
Learn More Learn MoreOur biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreSearch the knowledge base for answers to FAQs & more.
Learn More Learn Morewith Michael Byrnes, Director, Solutions Engineering; Layale Hachem, Solutions Engineer
The practice of removing admin rights from end users has become quite popular among different organizations not only because it helps Information Technology teams comply with security regulations, but also because it drastically reduces the attack surface.
Despite the enforcement of the Least Privilege concept, most organizations are still at risk! Why are privileged accounts still considered a threat even after removing admin rights from end users, and how can organizations properly enforce the least privilege concept?
Watch this webinar to get these questions answered. Our agenda will cover:
Michael Byrnes is the Director, Solutions Engineer iMEA for BeyondTrust. He has acquired a wealth of cyber security experience in a number of engagements over the last 10 years with a diverse set of IT companies across the Middle East. Thanks to his various roles as a security consultant, a systems engineer or within pre-sales, he gained extensive expertise in network and information security, architecture design and virtualization. Within his current position at BeyondTrust, Michael manages the solution engineers’ team in the Middle East, India and Africa. With his group, he engages and advises partners, customers and prospects in their Privileged Access Management (PAM) strategy to secure and manage their entire universe of privileges.
Layale Hachem is a Solutions Engineer at BeyondTrust. Before joining the company, she has worked 4 years at a cybersecurity-focused distributor in the Middle East as a Systems Engineer, a Product Specialist and a Solutions Engineer Team Leader. Over her previous and current professional roles, she has been able to build a comprehensive knowledge of the IAM and data protection fields. She has gained an extensive knowledge and has specialized on Endpoint Privilege Management, Privileged Access Management, network security and Endpoint Detection and Response.