Role-specific Least Privilege Protection of Linux Machines

Logo
Presented by

Adam Markert, Cyberark; Cameron Skidmore, Red Hat; Jack Poller, ESG

About this talk

Cyber attackers have become more innovative when targeting privileged accounts. Threat actors commonly target privileged endpoints such as Linux administrator accounts and once attackers gain access, they can traverse the network and take over workstations, servers and critical parts of the infrastructure. Do you have the necessary tools in place to safeguard your critical assets and ensure the integrity of your cloud-based operations? Join ESG, Red Hat, and CyberArk for an engaging discussion about endpoint privilege management. Topics include: • Identity-related threats and controls against these threats • Securing Linux-based cloud instances and how to simplify the administration of security policies • A secure and easy way of connecting to and working on cloud machines with certified solutions from Red Hat and CyberArk We will explore best practices, real-world use cases, and actionable insights to help you secure your Linux deployments effectively. Join us to learn how the combined strengths of Red Hat and CyberArk can help you fortify your Linux infrastructure against evolving cyber threats, enhance operational efficiency, and achieve regulatory compliance.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (12)
Subscribers (1575)
CyberArk is partnered with organizations around the globe to offer the most complete and extensible identity security solution, protecting identities and critical assets by enabling zero trust and enforcing least privilege. This channel is focused on addressing today’s most critical Identity Security challenges in conjunction with CyberArk's Partner Network.