Phone Number +1-202-802-9399 (US)

One Size Doesn’t Fit All: Defining Least Privilege Policies for Different Departments & Users

With 85% of breaches involving compromised endpoints, organizations are implementing a least privilege security posture and application control to minimize risks caused by cyberattacks and fraudulent users. Before getting started, you’ll need to design policies for different departments and users, keeping in mind how implementing least privilege will affect their productivity. Your IT Admins, for example, should have standard accounts without privileged network access for day-to-day tasks and be granted privileged access only occasionally as needed. Your business users will need access to applications with restricted privileges that do not interfere with getting their work done.

Join Thycotic’s Privilege Manager Product Manager, Steve Goldberg, and Product Marketing Manager, Barbara Hoffman, as they show you how to create a custom least privilege security plan that manages different users and application requirements based on different department needs. They will share real-world examples of policies that help organizations implement a least privilege strategy.

You’ll learn: 

  • How to automate your application policies and workflows to review and approve applications to accommodate different departments
  • How to craft your department policies to meet your team’s access needs while meeting your IT policy and compliance requirements
  • Why the cloud makes so much sense for endpoint management

 

 

SHARE THIS


The following two tabs change content below.
mm

Barbara Hoffman

Barbara joins Thycotic with nearly a decade of experience in IT software and security, and many more years working in product management, development and marketing across a number of different industries. As part of the Product Marketing team, she helps define and drive marketing strategy, messaging & positioning, sales enablement, and content creation for Thycotic’s cornerstone offering, Secret Server, along with Privilege Behavior Analytics and Account Lifecycle Manager. Barbara earned her BS in International Business from George Washington University, her MBA from the University of Southern California and Cybersecurity Certification from Georgetown University.
mm

Barbara Hoffman
Barbara joins Thycotic with nearly a decade of experience in IT software and security, and many more years working in product management, development and marketing across a number of different industries. As part of the Product Marketing team, she helps define and drive marketing strategy, messaging & positioning, sales enablement, and content creation for Thycotic’s cornerstone offering, Secret Server, along with Privilege Behavior Analytics and Account Lifecycle Manager. Barbara earned her BS in International Business from George Washington University, her MBA from the University of Southern California and Cybersecurity Certification from Georgetown University.

mm

Steve Goldberg
Steve Goldberg began his career as a consultant and developer but has more recently served as a senior technical resource for solution engineering and product management teams. At Thycotic, Steve works as Senior Product Manager for the Privilege Manager solution. When not working, he’s playing tennis, watching the LA Kings, seeing as much live music as possible, and pretending like he knows a lot about wine.


Watch the Webinar