Resources

Improve Your Compliance Posture with Identity-Centric PAM

Compliance overview

Ever-changing compliance regulations make it difficult to become and remain compliant. In order to reassure stakeholders that confidential data is protected, most organizations must adhere to one or more mandates such as PCI DSS, GDPR, SOX, Singapore MAS, NIST, FISMA and/or HIPAA.

Watch this on-demand webinar for insights and trends around industry and government regulations and to learn how Identity-Centric Privileged Access Management (PAM):

  • Helps control, audit, and report on access to sensitive data
  • Establishes security controls that meet stringent regulations
  • Keeps administrative users productive
  • Eases preparation for upcoming audits

SPEAKERS

Torsten George

Dr. Torsten George, Cyber Security Evangelist, Centrify

He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years.

Tony Goulding

Tony Goulding, Cyber Security & Product Evangelist, Centrify

He brings over 30 years of experience in security, software, and customer relationship building to the Centrify team.

The form could not be loaded. This is most likely due to strict tracking protection in your browser.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us