Code Comments

Transforming Your Identity Management


Listen Later

Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That’s a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?

Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems.

The guest featured in this episode works for CyberArk, a Red Hat partner.

...more
View all episodesView all episodes
Download on the App Store

Code CommentsBy Red Hat

  • 5
  • 5
  • 5
  • 5
  • 5

5

11 ratings


More shows like Code Comments

View all
Compiler by Red Hat

Compiler

58 Listeners