This resource is no longer available

Insecurity of Privileged Users - Global Survey of IT Practitioners

Cover

This study, conducted by Ponemon Institute, examines the risks inherent in poor control and oversight of privilege users. View now to uncover the key findings and what can be done to minimize risk. Key topics addressed:

  • Privileged user access governance
  • The process for assigning privileged user access to IT resources
  • Critical success factors and barriers to reducing the risks of an insecure privileged user access program
  • And more
Vendor:
Hewlett-Packard Company
Posted:
23 Apr 2013
Published:
30 Dec 2011
Format:
PDF
Length:
33 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.