+1-202-802-9399 (US)

Locking Down Security with Least Privilege

Friday, May 31, 2019

60% of all Microsoft vulnerabilities published could be mitigated by removing admin rights. But how do you continuously enforce a Least Privilege policy, and what happens after you remove admin rights from business users? What if a user needs to run or install an application that requires admin rights?

Learn how Privilege Manager can automatically enforce your Least Privilege policy without impacting user productivity by including seamless application control. We will demonstrate how Privilege Manager can work for you including:

• Enforce your Least Privilege policy
• Discover software on Windows and Mac endpoints, whether domain joined or not.
• Create policies that will identify, evaluate and apply specific actions to any applications initiated on a Windows or Mac endpoint.
• Create easy policy groups we call Personas and quickly apply them to groups of endpoints or groups of users.
• Get comprehensive reports that provide a rich set of auditing and compliance information regarding your least privilege implementation and application control policies.

SHARE THIS


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.

Watch the Webinar