Addressing PCI Compliance through Priveleged Access Management

Virtually all recent major security incidents point to privileged users or credentials as a primary attack vector in the successful execution of a breach. Learn how an effective privileged access management approach allows an organization to restrict, log and monitor all activity performed by privileged accounts, such as network, system and database administrators.

Provided by: CA Technologies Topic: Security Date Added: Oct 2016 Format: PDF

Find By Topic