As businesses look to provide effective defenses from malicious attackers and rogue insiders, and to comply with newer audit and compliance mandates, Privileged Access Management has become an important counter-measure that is being adopted. One common approach is to provide a credential vault, which securely stores privileged passwords and SSH keys, and provides a secure way of supplying those credentials to authorized users.
Yet hiding beneath surface are applications and scripts that also use privileged credentials. Many of those applications and scripts use "hard-coded" credentials, which represent an unseen vulnerability that is waiting to be exploited.
Please join CA Technologies on July 22, 2016 to learn about an effective approach to use CA Privileged Access Manager to protect yourself from this vulnerability, and to solve the problem of hard-coded privileged credentials.
Event address for attendees: https://catechnologies.webex.com/catechnologies/onstage/g.php?MTID=ecf28b38ecb644aba90a8300e59113001
If you're seeing the time as 4:00PM above, that's because it's showing in GMT. If you login to this site, the event time will adjust to your local time zone. You can adjust your time zone in your community preferences.