Securing Access for Privileged Insiders and VendorsSam Elliott of Bomgar: 'We Often Forget about the Basics'
Securing access pathways is just as critical as securing user credentials, says Sam Elliott of Bomgar, who points out that too many organizations overlook some fundamental steps.
See Also: Gartner Magic Quadrant for APM
In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Lewin discusses:
- How access security can improve business productivity;
- The six steps of securing access; and
- Why privileged-access controls still seem so daunting to so many companies.
At Bomgar, Elliott leads a team of product managers responsible for developing strategy and defining, managing and launching new cybersecurity product suites and offerings. Previously, Elliott held similar positions at BMC Software and Numara Software.