Many organizations are still making sense of security in the newly remote workforce. Fortunately, Morey Haber, the Chief Technology Officer and Chief Information Security Officer at BeyondTrust, has some tips to help secure your extended network. He talks taking inventory of assets, removing excessive admin access, pragmatic application control, and more. Check out our latest #MillenniumLive episode to learn more about shifting from a reactive to a proactive security posture to manage vulnerabilities in your remote network.
Watch the video interview below, or go here for the podcast episode.
About BeyondTrust
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry’s most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. We are trusted by 20,000 customers, including 70 percent of the Fortune 500, and a global partner network.