CyberArk Just in Time Access Whiteboard Video

December 3, 2019

Brief video summarizes how organizations can reduce risk by removing unneeded standing access to privileged credentials and instead provide ‘just in time access’ to the credentials – essentially only providing the right user, the right access to the right resource at the right time. The video highlights how ‘just in time access’ can be offered and the three primary methods to implement: Broker and remove, Ephemeral accounts and Temporary elevation.

The ‘just in time access’ approach avoids organization granting standing access to administrators and others to access critical resources that in many cases are only needed occasionally if at all.

Previous Video
CyberArk Privileged Access Security 101 Pt. 1
CyberArk Privileged Access Security 101 Pt. 1

Privileged access. What is it? Who needs it? Why should you secure it? Learn the basics with this video.

Next Video
CyberArk Privileged Access Security 101 Pt. 2
CyberArk Privileged Access Security 101 Pt. 2

Part two of our PAM 101 video explores where privilege exists, who the largest threats are, and how attacke...