Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of BeyondTrust
Forums it-sa Expo Knowledge Forum F

Just-in-Time Access: Management of Access in Cloud and Hybrid Environments

This session explains how just-in-time access can be used to optimize access management across the organization.

calendar_today Thu, 24.10.2024, 10:30 - 10:45

event_available On site

place Forum, Booth 9-443

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Data protection / GDPR Endpoint Protection Identity and access management Secure Homeoffice Websecurity / VPN Trend topic

Key Facts

  • Increasing efficiency with automated workflows
  • Improving security with the least privilege principle
  • Compliance with data protection regulations

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Traditional access controls have proven to be inadequate in terms of corporate security when it comes to granting time-limited and time-critical access. With just-in-time (JIT) access, administrators can grant users access for a specific period of time, which is automatically withdrawn after the time has expired.

JIT offers a dynamic way to manage access to cloud and on-premise resources. Users must be able to independently request access to resources as required. Once the conditions of the security policy are met, the user receives automatic authorization with a controlled level of access. The user is then granted time-limited access, which is automatically revoked after the time has expired. This allows zero-trust criteria to be implemented and massively reduces the attack surface on the company side.

This session will focus on how cloud-native administrators can use JIT access to assign temporary administrative roles to third-party platforms to manage their cloud systems.

Highlights of the session:
• Optimization of access control across the company
• Increasing efficiency with automated workflows
• Improving security with the least privilege principle
• Compliance with data protection regulations

Gain valuable insights into how JIT access can help you protect your organization from threats and reduce the attack surface.
... read more

Downloads

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.