+1-202-802-9399 (US)

Video: Limit user privileges and minimize privileged credential risk with these privileged access management tools

Jacob Stucky, our VP of Software Development provides a quick overview of several privilege access management tools that enable IT Security and IT Ops to secure passwords and other privileged credentials, and enforce least privilege on endpoints.

The following two tabs change content below.

CarolynO

Latest posts by CarolynO (see all)

“The easiest way to get onto an endpoint in a company is social engineering is a spear phishing attack—tricking someone into giving you the credentials they have access to. This is why it's critically important that the credentials your end users have access to have extremely low permissions and privileges.”