Live Webinar

Shared Accounts: The Back Door That's Tough To Close

Unauthorised use of shared accounts extracts a heavy toll on businesses every year. A shared account's weakness of not having 1-to-1 employee-to-account assurance means you never really know what employees (or how many of them) are active on one of these accounts at a given time.

Join Bloor Research Senior Analyst Fran Howarth as she discusses shared and privileged accounts.

Date and Time:

Wednesday, 19 March 2014
15:00, GMT Time (London, GMT)

Learn about:

Finally, watch a live demonstration of today’s technology solutions from Centrify, as we showcase the Centrify Server Suite and discuss real-world scenarios regarding privilege elevation and auditing.

Fran Howarth, Sr. Analyst with Bloor Research
Fran Howarth

Fran Howarth specialises in security, a field in which she has more than 25 years of experience in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a particular interest in emerging technology sectors. Current areas of focus include new technology delivery mechanisms such as cloud-based services, identity and access management, data security, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Barry Scott, Centrify
Barry Scott

Barry Scott of Centrify can be considered an industry veteran with over 25 years experience working in the Windows, Unix and Linux space helping major organisations in almost every industry vertical. Barry has held various Infrastructure Operations and Architecture roles, working on a wide and diverse range of Operating Systems. The last 9 years of Barry's career have been spent helping organisations manage their Identity Management and Auditing challenges, especially in what has become known as "AD-bridge" technology, with a focus on security, regulatory compliance and operational efficiency. Barry's current role is focused around enabling Centrify customers to use infrastructure they already own — Microsoft's Active Directory — to control, secure and audit heterogeneous systems, mobile devices and applications.

Fill out the form below to register for the webinar.

(All fields are required.)