Video: Privileged access in the enterprise

An effective security strategy should include adequate privileged management security practices. Certain applications should be whitelisted, others blacklisted, and those that fall between the lines are graylisted. According to Leonid Shtilman, CEO of Viewfinity, graylisted applications are the ones that need to be monitored closely. They need to put under restrictive modes that won't allow the application to access corporate data, thus limiting the amount of damage that can be done if an intruder happens to gain privileged access to an employees account.

In this video, Shtilman sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

More in Videos

Video: The continued rise of DDoS

In this video, Ashley Stephenson, CEO at Corero Network Security, discusses the development of DDoS attacks, as well as how security professionals can grapple with the challenges the threat poses.

Video: The risks surrounding digital certificates

In this video, Jeff Hudson, CEO at Venafi, discusses the importance of digital certificates, as well as the threats surrounding forged ones should they be used in an attack against an organization.

Video: The challenges third-parties pose for SMBs

In this video, Marcos Colón, digital content coordinator at SC Magazine, sits with Charles Henderson, director of SpiderLabs at Trustwave, to discuss the growing challenges that SMBs face with third-parties that may put an organization's data at risk.