Video: Privileged access in the enterprise

Share this article:

An effective security strategy should include adequate privileged management security practices. Certain applications should be whitelisted, others blacklisted, and those that fall between the lines are graylisted. According to Leonid Shtilman, CEO of Viewfinity, graylisted applications are the ones that need to be monitored closely. They need to put under restrictive modes that won't allow the application to access corporate data, thus limiting the amount of damage that can be done if an intruder happens to gain privileged access to an employees account.

In this video, Shtilman sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

Share this article:

More in Videos

Applying the cyber kill chain

In this video, SC Magazine chats with Chandra McMahon of Lockheed Martin on ways organizations can leverage the cyber kill chain in order to improve their detection, mitigation, and defense posture.

The evolving role of the CSO

In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.

Added authentication in today's workplace

In this video interview, Dug Song, CEO of Duo Security, discusses the impact of two-factor authentication and its deployment in the workplace, as well as the effect that wearables will have on the enterprise in the future.