Enterprise Password & Key Management - The missing element in the access management strategy for NFPs
and Outcomes:
Privileged access is the gateway to an organisation’s most valuable assets and is at the core of nearly every major security breach today.
The only way to stop the abuse of the privileged access and to combat the evolving cyber-attacks is by adopting a strict access management strategy using a simple solution to :
- Discover & organize the privileged identities in a secured centralized vault
- Manage the life cycle of the privileged identities
- Seamlessly control and manage privileged access
- Impose granular access restrictions on the identities with release controls
- Proactively monitor to prevent mishandling of privileged access.
- Report on the compliance against the requirements of PCI-DSS,GDPR.
- Enable detailed audit trial of the privileged activities
- Integrate with SIEM to consolidate and visualize the log data for remote sessions
This course is suitable for:
The course is suitable for IT System Admins, IT Network Admins, IT Application Admins, IT Team Leads and IT Managers involved in day-to-day ICT Operations.
Date: 21st September 2021
Time: 11:30AM - 12:15PM (AEST)
Price: Free
Course level: Beginners/Intermediate
Course Outline and Outcomes:
Privileged access is the gateway to an organisation’s most valuable assets and is at the core of nearly every major security breach today.
The only way to stop the abuse of the privileged access and to combat the evolving cyber-attacks is by adopting a strict access management strategy using a simple solution to :
- Discover & organize the privileged identities in a secured centralized vault
- Manage the life cycle of the privileged identities
- Seamlessly control and manage privileged access
- Impose granular access restrictions on the identities with release controls
- Proactively monitor to prevent mishandling of privileged access.
- Report on the compliance against the requirements of PCI-DSS,GDPR.
- Enable detailed audit trial of the privileged activities
- Integrate with SIEM to consolidate and visualize the log data for remote sessions
This course is suitable for:
The course is suitable for IT System Admins, IT Network Admins, IT Application Admins, IT Team Leads and IT Managers involved in day-to-day ICT Operations.