Authentication , ID & Access Management , Technology

Privileged Access Management: The Hidden Obstacles

Alex Mosher of CA Technologies on How to Clear These Hurdles

Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.

See Also: Addressing the Identity Risk Factor in the Age of 'Need It Now'

In a video interview recorded at ISMG's San Francisco Fraud and Breach Prevention Summit, Mosher discusses:

  • The technology challenges to PAM;
  • The business issues that often are overlooked:
  • How cloud complicates everything.

As global vice president of CA Technologies, Mosher is responsible for CA's cybersecurity strategy and go-to-market plan and execution. Working to align CA's cybersecurity solutions and portfolio with customer requirements and objectives, Mosher leads a team that works to develop and implement action plans that enable customers to take control of security, identities, access and information across platforms and devices. Mosher joined CA in 2007. As a 20-year information technology industry veteran, he has amassed hands-on experience in virtually every aspect of the business, including sales and marketing, development and deployment services.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its diverse cadre of senior-level editors and reporters. He also helped to develop and lead ISMG's award-winning Summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network