Resources

CyberCast: Enforcing Least Privilege: Just Enough, Just-in-Time

CyberCast - Enforcing Least Privilege: Just Enough, Just-in-Time

GRANT JUST ENOUGH PRIVILEGE ACCESS. ONLY AS NEEDED.

Least Privilege Access based on Just Enough, Just-in-Time Privileged Access Management (JIT PAM) is a best practice. The concept of least privilege is to only provide the needed level of privilege to perform a certain task, and only for the amount of time necessary to perform that task. The goal is to leave zero standing privileges.

Enforcing least privilege allows organizations to minimize the attack surface and improve audit and compliance visibility while also reducing risk, complexity, and costs for the modern, hybrid enterprise.

Watch this on-demand CyberCast to learn more about the benefits of a Just Enough, Just-in-Time (JIT) approach and more Privileged Access Management (PAM) best practices:

  • Temporary, time-based role assignment
  • Dynamic access controls
  • Zero standing privilege
  • Identity-Centric Privileged Access Management

SPEAKERS

Brad Shewmake Headshot

Brad Shewmake, Director of Corporate Communications, Centrify

Chris Owen

Chris Owen, Director of Product Management, Centrify

Chris joined Centrify in 2019 as Director of Product Management. Chris’s current role takes him around the world where he speaks frequently to audiences looking to gain insight into the world of Privileged Access Management.

The form could not be loaded. This is most likely due to strict tracking protection in your browser.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial