This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_WALLIX PEDM

WALLIX PEDM

LOGO_WALLIX PEDM

WALLIX PEDM

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Least Privilege in Action

Administration rights introduce critical vulnerabilities to your vital assets. Ensure that only the right privilege is granted to the right account, at the right time, without compromising productivity.

ENFORCED LEAST PRIVILEGE MANAGEMENT PRINCIPLE
• Eliminate the risk of overprivileged users who can wreak havoc in your IT network at the click of a button
• Zero local administrator policy: grant privileges at a granular level with the ability to assign specific rights to a user to execute a specific action
• Privilege segregation by establishing a security context for applications & processes rather than by user
• Facilitate productivity: non-administrator users can still run tasks with adapted privileges with no impact on productivity

PRIVILEGED ACCESS MANAGEMENT FOR CRITICAL SYSTEMS
• Protect assets with combined user access workflows, credential rotation, and local rights limitation
• Secure critical systems through session control and local system application and process management
• Trace and monitor activity with complete session recording, metadata, and logs for local devices

ENDPOINT SYSTEM PROTECTION
• Fine-tune application rights so that they can only be used to perform authorized actions by authorized users
• Prevent known and unknown attacks by blocking all unauthorized actions intending to modify the system
• Neutralize ransomware: encryption operations are detected before being carried out

https://cdn2.hubspot.net/hubfs/514643/German/datasheets%20english/Borchure2019_PEDM_EN-1.pdf

WALLIX PEDM is assigned to following product groups:

You decided to attend the it-sa? Get your tickets at the TicketShop



top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.