×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Vendor Access Best Practices with Vendor PAM

October 26, 2022

Vendors. Everyone has them. How do you ensure that vendors accessing your systems and applications are protected in the same manner as your internal privileged users? Join us to learn how implementing CyberArk Vendor Privileged Access Manager can help protect vendors who need privileged access to your systems and applications.

During this presentation, Elliott Jefferson, Identity and Access Team Lead from CyberArk customer Northwestern Medicine, and Jayne Little, Independent CyberArk Consultant from Blue Heron Security Solutions, will share:

The challenges most organizations face when managing vendor access
Best practices for implementing Vendor Privilege Access Manager
How to operationalize vendor onboarding and access

Previous Video
CyberTalks: Breaking the Attack Chain
CyberTalks: Breaking the Attack Chain

During CyberTalks, Kevin Jermyn, Manager, Customer Success, CyberArk, spoke on Breaking the Attack Chain fo...

Next Video
Better Together, and Easier than Ever with SaaS: Identity Governance & Administration (IGA) and Privileged Access Management (PAM)
Better Together, and Easier than Ever with SaaS: Identity Governance & Administration (IGA) and Privileged Access Management (PAM)

Join IDC to understand how you can rapidly and securely address the identity explosion and get out of Cyber...