×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Mastering the Role of Gatekeeper in the Cloud

July 10, 2020

When agencies go to the cloud, they usually do so with aspirations of more efficiency and new possibilities.Security’s job then is straightforward: Keep everything safe, and stay out of the way.

The problem is, that job isn’t so easy to execute when you factor business realities into the equation. For as many cloud vendors as there are that boast powerful and effective security solutions, agencies still go to multiple clouds because of cost and technical debt, creating an inconsistent landscape of security.This danger is especially pronounced when it comes to tracking users. As users bounce in and out of different workflows and multiple clouds, agencies need a way to enforce that these accounts are only accessing what they’re authorized to. This is known as privileged access management.

“We’re looking to ensure that people have the tools to do their job, and nothing more,” said Kevin Jermyn, Manager of Federal Engineering at CyberArk. CyberArk specializes in privileged access management and can work with multiple cloud providers simultaneously. In an interview with GovLoop, Jermyn provided three ideas for how agencies can make sure that access is secure in the cloud.

Previous Video
Successful, Simple and Cost Efficient Privileged Access Management Program? Yes, With PAM as a Service!
Successful, Simple and Cost Efficient Privileged Access Management Program? Yes, With PAM as a Service!

PAM programs are often perceived as long and complex, to make it a successful, simple and cost efficient ex...

Next Flipbook
Privileged Access Management as a Service For Dummies
Privileged Access Management as a Service For Dummies

Privileged Access Management is a critical part of any cyber security program. PAM as a Service For Dummies...