Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

Podcast: Addressing Credential Compromise and Insider Threats Requires a New Security Approach

How can you secure an organization by using identity, behavior and risk? Preempt CEO Ajit Sancheti recently conducted an interview with Blog Talk Radio on how the enterprise perimeter is eroding – and what to do about it. Identity and Access Threat Prevention is a critical component of an effective enterprise cybersecurity, and as Ajit explains, a strategy that combines holistic visibility and real-time enforcement addresses the complex nature of today’s enterprise IT environments.

From cloud to on-prem and hybrid, Preempt’s use of identity, behavior and risk, coupled with real-time adaptive responses and a rich policy engine, enables some of the world’s leading organizations to secure their perimeter in the face of rapidly evolving threats. Listen to the podcast to learn:

  • How enterprises can address insider threats, credential compromise and other attack vectors that comprise the majority of attack vectors facing organizations today

  • How organizations can implement frameworks such as Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA)

  • The gaps of Privileged Access Management (PAM) and Identity and Access Management (IAM) solutions, and how enterprises can eliminate silos and more effectively use existing solutions

Blog Talk Radio

 

Topics: Insider Threat,

Posted by Matt Culbertson on March 6, 2019 10:59 AM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More