Privileged Access Management

Поделиться
HTML-код
  • Опубликовано: 10 янв 2025

Комментарии • 48

  • @LoiLiangYang
    @LoiLiangYang  5 лет назад +8

    Remember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.

    • @balajimunikrishnan8917
      @balajimunikrishnan8917 5 лет назад +2

      Great presentation could you please help me I need to learn cyberark top to bottom please.

    • @amoltofi1
      @amoltofi1 3 года назад

      @@balajimunikrishnan8917 I like to discuss with technical discussion with you, if you also like please connect me by FB account - amoltofi
      Insta I'd- amoldhaygude

  • @japandeliciousfood4095
    @japandeliciousfood4095 4 года назад +3

    Wow, this is what I was looking for, thank you sir for your good and excellent work. It is very helpful for me and for my company

  • @r3sistor
    @r3sistor 5 лет назад +3

    Great presentation Loi! It was easy to understand and at the end of the video, i gained very valuable knowledge on what an PAM does for an organization. Thank you for sharing this knowledge.

    • @LoiLiangYang
      @LoiLiangYang  5 лет назад

      Great. Glad it is valuable for you.

    • @amoltofi1
      @amoltofi1 3 года назад

      I like to discuss with technical discussion with you, if you also like please connect me by FB account - amoltofi
      Insta I'd- amoldhaygude

    • @anntakamaki1960
      @anntakamaki1960 2 года назад

      Bikini religion 👙

  • @gustavoadolfocardenasjorda4517
    @gustavoadolfocardenasjorda4517 2 года назад

    This was the best PAM presentation thank you very much for the information. Regards

  • @EllencyOfficial
    @EllencyOfficial 6 месяцев назад

    Thanks, Great overview. I'm starting on a new customer with Oneidentity PAM. I've hearc cyberark is mostly used though? thanks again brother

  • @thedr00
    @thedr00 5 лет назад +5

    This was excellent. Great job!

    • @amoltofi1
      @amoltofi1 3 года назад

      I like to discuss with technical discussion with you, if you also like please connect me by FB account - amoltofi
      Insta I'd- amoldhaygude

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt 22 дня назад

    Very good information ❤

  • @benardkibetrotich5240
    @benardkibetrotich5240 2 года назад

    what are the tools or systems available to implement PAM

  • @dawnbunty7
    @dawnbunty7 4 года назад +1

    short and to the point well done

    • @amoltofi1
      @amoltofi1 3 года назад

      I like to discuss with technical discussion with you, if you also like please connect me by FB account - amoltofi
      Insta I'd- amoldhaygude

  • @mrm3gabyte448
    @mrm3gabyte448 6 лет назад +1

    Great presentation! Thank you very much for sharing the information. It will help me integrate a good PAM in my company.

    • @LoiLiangYang
      @LoiLiangYang  6 лет назад +1

      You're welcome. For integrating enterprise level privileged access management solution, you need a long checklist and thorough analysis of those platforms.

  • @DrumsAndGadgets
    @DrumsAndGadgets 2 года назад

    Excellent breakdown! Thank you.

  • @benardkibetrotich5240
    @benardkibetrotich5240 2 года назад

    Nice and informative presentation

  • @Hareesh-w3q
    @Hareesh-w3q Год назад

    Can PAM be connect to Power BI tool?

  • @AmanGargi
    @AmanGargi 2 года назад

    Thank you Loi for the video. I am implementing PAM solution in my organisation. I understand for servers, switches it is a must for privileged users. However for applications is it really required? Considering app admin has very limited access compared to standard user. An app admin can add/delete the user and may be modify few parameters. Also application has in-built control which means an any activity performed by an admin is logged (not always but most of the times). A standard user for an application has much more power (approve applications, process money transfer). Considering the scope of PAM solution in my organisation is privileged user only (admin users). Do applications need to be on-boarded to PAM?

    • @Larryjazzy271
      @Larryjazzy271 2 года назад

      It depends on the security requirements for privileged users in your organisation. If you have a security standard that instructs all privileged users to be onboarded to PAM then that's your answer right there. However if you have no standard in this area. The security best practice is to onboard your apps to PAM for privileged accounts

  • @fernandorose6358
    @fernandorose6358 2 года назад

    Thank you for the clear explanation 🙏

  • @vaneza2471
    @vaneza2471 5 лет назад +1

    thanks for sharing this information.I'm new in Linux audit security. My question is this, is there a tool or specific process on how I can easily audit the access management in Linux which has like 200+ servers? thanks in advance

    • @LoiLiangYang
      @LoiLiangYang  5 лет назад

      Lots of tools out there in the market which can do that. Or you can script it but it can be very tedious.

  • @stodo1337
    @stodo1337 2 года назад

    Can you do a comparison of PAM software vendors? Thanks!

  • @LeanghengHorm
    @LeanghengHorm 2 года назад

    Clear explanation, Thanks

  • @nukebase4188
    @nukebase4188 3 года назад

    Great presentation. We seriously need an example of how to set up PAM in our infrasctructure (linux or windows). THANK YOU

  • @balajimunikrishnan8917
    @balajimunikrishnan8917 5 лет назад +1

    Fantastic presentation could you please help me I need to learn cyberark top to bottom please help .

  • @shreyasshetty2877
    @shreyasshetty2877 3 года назад

    Wonderful explaination.

  • @abhaypratap5311
    @abhaypratap5311 6 лет назад +1

    Please start a series malware packet analysis through network security tool.

  • @kader8815
    @kader8815 Год назад

    i have academic PAM project can you help me to give me some tuto to follow this !

  • @topkhmersongremix2865
    @topkhmersongremix2865 3 года назад

    Thanks for best explanation, anyway do you have ppt?

  • @d3daiM
    @d3daiM 2 года назад

    wow great explanations!

  • @hasanalhuraibi4100
    @hasanalhuraibi4100 5 лет назад

    Greate Presentation. Thank you. Could you please give as what a leader PAM product or company. So we can check specifications and prices.

  • @sgzenith
    @sgzenith 6 лет назад

    Great presentation!

  • @hoffmania
    @hoffmania Год назад

    Is it possible for you to re-record the audio with the proper pronunciation of key words so that it is more understandable?

  • @abdel2459
    @abdel2459 3 года назад

    thank you sir!

  • @joseph7181
    @joseph7181 6 лет назад +1

    Thanks

  • @MinhNguyen-uv8bi
    @MinhNguyen-uv8bi Год назад

    Great presentation! Thank you very much for sharing the information. It will help me integrate a good PAM in my company.

  • @elmahdierraji4531
    @elmahdierraji4531 3 года назад

    thank you