Securing Access for Privileged Insiders and Vendors

Securing access pathways is just as critical as securing user credentials, says Sam Elliott of Bomgar, who points out that too many organizations overlook some fundamental steps.

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Lewin discusses:

  • How access security can improve business productivity;
  • The six steps of securing access; and
  • Why privileged-access controls still seem so daunting to so many companies.

Read more