Contents
- 1 Key Concepts
- 2 Threat Analytics – Analysing Potential Security Breaches
- 3 Video Session Logging – Recording Activities of Privileged Accounts
- 4 User Event Logging – Monitoring Event Logs of Privileged Users
- 5 Password Rotation: Need to Rotate Privileged Account Passwords
- 6 Password Reconciliation – Enabling Synchronized Password Management
- 7 Password Vaulting – Eliminating High-Risk Password Practices
- 8 Password Reset v/s Password Change
- 9 The Importance of Password-based Authentication