Privileged User Management

IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

TEC 2013 ERP Buyer's Guide for Process Manufacturing

  • Source:
A focus on user experience is driving ERP vendors to deliver lean, flexible solutions that blur the lines between traditional ERP tiers. Read this buyer’s guide and see how vendors are addressing the most pressing process manufacturing challenges—especially for food and beverage companies who face unique pressures in today’s health-conscious market—and how trends like integrated BI, in-memory analytics, mobility, and social media are changing the way process manufacturers do business.
  • Written By:
  • Published On: May 28 2013

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

HTML5 in Field Mobility—Mind the Gap

When reviewing your mobility strategy for a field service app—whether you’re building or buying a mobile application—you must balance compatibility, the user experience, and the risks you’re willing to take. Learn more in this white paper on HTML5 in field mobility.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Compliance and Privileged Password Management

Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help.
  • Written By:
  • Published On:

Achieving PCI Compliance for Privileged Password Management and Remote Vendor Access

Noncompliance with Payment Card Industry (PCI) standards can have a devastating effect on any company that relies on credit card transactions. Contractual penalties and revocation of your rights to process credit card transactions are just two potential repercussions. Though there is no single solution for PCI compliance, you can minimize the risks by staying on top of the latest products and procedures. Learn more.
  • Written By:
  • Published On:

Privileged User Monitoring for SOX Compliance

Many companies face the Sarbanes-Oxley (SOX) compliance challenge of monitoring all the data activity of their most privileged users. Those challenges include tracking access to sensitive financial data, reporting on controls, and responding to problems. Learn about a database auditing and protection solution that can help capture targeted activities, without impacting the performance of production databases and software.
  • Written By:
  • Published On: