Privileged Access Management

European Identity Conference 2010
04.05. - 07.05.2010, Munich

Moderator:
Privileged Access Management (PAM) put into Context � Access Governance Strategy or just Tactics? 06.05.2010 10:30-11:30
Privileged Access Management (PAM) put into Context � Access Governance Strategy or just Tactics?
Martin Kuppinger, Kuppinger Cole

Panel: Privileged Identities - Identify, Delegate, Enforce, Audit
Jochen Koehler, Cyber-Ark Software • Philip Lieberman, Lieberman Software • Nimrod Vax, CA
High-profile data breaches emphasize the need to maintain and safeguard privileged accounts, but oftentimes, nothing is done to effectively limit exposure of highly sensitive data. There are four key processes that can help organizations regain control of privileged accounts in a cost-effective manner. Identifying, delegating, enforcing and auditing (I.D.E.A.) can improve security and operational efficiency, take control of privileged accounts and close security gaps within the...

Privileged Identity and Access Management at Daimler (TSS) 06.05.2010 11:30-12:30
Privileged Identity and Access Management at Daimler (TSS)
Daniel R�tsch, Daimler TSS

© 2010 Kuppinger Cole Ltd.