Video: Privileged access in the enterprise

Share this article:

An effective security strategy should include adequate privileged management security practices. Certain applications should be whitelisted, others blacklisted, and those that fall between the lines are graylisted. According to Leonid Shtilman, CEO of Viewfinity, graylisted applications are the ones that need to be monitored closely. They need to put under restrictive modes that won't allow the application to access corporate data, thus limiting the amount of damage that can be done if an intruder happens to gain privileged access to an employees account.

In this video, Shtilman sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

Share this article:

More in Videos

The driving force behind new attacks

The driving force behind new attacks

Roel Schouwenberg, principal security researcher at Kaspersky Lab, speaks with SC Magazine on why new approaches have been employed to go after the same means.

Why companies still struggle with security basics

In this video, Rob Kraus, director of research at Solutionary, speaks with SC Magazine reporter Danielle Walker on the company's Global Threat Intelligence report, which highlights ways to master core security practices.

Understanding encryption and key management

In this video, Richard Moulds, VP strategy with Thales e-Security, speaks with SC Magazine reporter Adam Greenberg on how encryption works and how to improve key management.