The Who's Who of IT Admins and How To Secure Them

April 22, 2024

Watch to learn about different types of high-risk and administrative accounts, and the best practices to secure these human and non-human identities. Protecting access to critical systems and extending these controls to secure an evolving landscape is critical. We will discuss foundational principles, best practices for securing access to accounts with persistent access, how zero-standing privileges (ZSP) and just-in-time (JIT) reduces risk of credential theft past the principle of least privilege, and how to secure identities that are becoming frequent targets of attackers. 

Previous Article
Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI
Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI

In the past, many security teams considered securing secrets enough – if your secrets were secured, you wer...

Next Video
IAM Advantage Unleashed: Pinnacle Solutions for Accelerating and Elevating Government Security
IAM Advantage Unleashed: Pinnacle Solutions for Accelerating and Elevating Government Security

Understand how the combined expertise of CyberArk, Ping Identity, Radiant Logic, and SailPoint aligns with ...