Resources

Why Vaults Alone Are Not Enough

Watch-It-Work

Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions:

  • Brokering of identities
  • MFA enforcement
  • Just-enough privilege

SPEAKERS

Torsten George

Dr. Torsten George, Cybersecurity Evangelist, Centrify

Torsten is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices, as well as other cyber security topics in media outlets.

Tony Goulding

Tony Goulding, Senior Director of Technical Marketing, Centrify

Tony brings over 30 years of experience in security, software, and customer relationship-building to the Centrify team.

The form could not be loaded. This is most likely due to strict tracking protection in your browser.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us