Video: Privileged access in the enterprise

Share this article:

An effective security strategy should include adequate privileged management security practices. Certain applications should be whitelisted, others blacklisted, and those that fall between the lines are graylisted. According to Leonid Shtilman, CEO of Viewfinity, graylisted applications are the ones that need to be monitored closely. They need to put under restrictive modes that won't allow the application to access corporate data, thus limiting the amount of damage that can be done if an intruder happens to gain privileged access to an employees account.

In this video, Shtilman sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

Share this article:

More in Videos

Phishing for the "wildcard"

Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, speaks with reporter Danielle Walker on social engineering ruses targeting wildcard certificates.

The driving force behind new attacks

The driving force behind new attacks

Roel Schouwenberg, principal security researcher at Kaspersky Lab, speaks with SC Magazine on why new approaches have been employed to go after the same means.

Why companies still struggle with security basics

In this video, Rob Kraus, director of research at Solutionary, speaks with SC Magazine reporter Danielle Walker on the company's Global Threat Intelligence report, which highlights ways to master core security practices.