Podcast: Addressing Credential Compromise and Insider Threats Requires a New Security Approach

How can you secure an organization by using identity, behavior and risk? Preempt CEO Ajit Sancheti recently conducted an interview with Blog Talk Radio on how the enterprise perimeter is eroding – and what to do about it. Identity and Access Threat Prevention is a critical component of an effective enterprise cybersecurity, and as Ajit explains, a strategy that combines holistic visibility and real-time enforcement addresses the complex nature of today’s enterprise IT environments.

Cloud Native Now

From cloud to on-prem and hybrid, Preempt’s use of identity, behavior and risk, coupled with real-time adaptive responses and a rich policy engine, enables some of the world’s leading organizations to secure their perimeter in the face of rapidly evolving threats. Listen to the podcast to learn:

  • How enterprises can address insider threats, credential compromise and other attack vectors that comprise the majority of attack vectors facing organizations today

  • How organizations can implement frameworks such as Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA)

  • The gaps of Privileged Access Management (PAM) and Identity and Access Management (IAM) solutions, and how enterprises can eliminate silos and more effectively use existing solutions

Blog Talk Radio


*** This is a Security Bloggers Network syndicated blog from Preempt Blog authored by Matt Culbertson. Read the original post at:

Cloud Capabilities Poll