High Definition Standard Definition Theater
Video id : hVLaRQ3TjGk
ImmersiveAmbientModecolor: #125ef2 (color 2)
Video Format : 22 (720p) openh264 ( https://github.com/cisco/openh264) mp4a.40.2 | 44100Hz
Audio Format: Opus - Normalized audio
PokeTubeEncryptID: 970458fb020589c3bc262b1a103af5e31216e8cf529abb32d00b618e0e5266a8144800984ed4ed2a27420a9b890fbbcd
Proxy : usa-proxy.poketube.fun - refresh the page to change the proxy location
Date : 1714651388252 - unknown on Apple WebKit
Mystery text : aFZMYVJRM1RqR2sgaSAgbG92ICB1IHVzYS1wcm94eS5wb2tldHViZS5mdW4=
143 : true
Why you need Privileged Account Management
Jump to Connections
13,788 Views • Sep 26, 2022 • Click to toggle off description
Implement PAM → ibm.biz/BdPzjy

You have probably received these instructions from your IT department, "Don't write down your passwords & don't share your passwords with anyone." It's good advice, so you might be surprised when you find out IT departments frequently ignore it when it comes to their most sensitive accounts. In this video, Jeff Crume explains, why this happens, and how implementing privileged accesses management can help keep your organization secure.

Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up

Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
Metadata And Engagement

Views : 13,788
Genre: Education
Date of upload: Sep 26, 2022 ^^


Rating : 4.991 (1/455 LTDR)
RYD date created : 2024-03-07T06:03:40.666396Z
See in json
Tags
Connections
Nyo connections found on the description ;_; report a issue lol

YouTube Comments - 26 Comments

Top Comments of this video!! :3

@mathcss8496

1 year ago

This guy explains these concepts like a rockstar

19 |

@thereal_jan

8 months ago

that was the best explanation of PAM I heard so far! thank you so much

2 |

@SahadFoundation

8 months ago

Thank you for this explanation.

2 |

@princeaaron3186

1 year ago

Fantastic explanation

4 |

@RohanSingh-dy5ks

1 month ago

Phenomenal way to explain complex items.:finger-red-number-one:

|

@leonatkrasniqi5631

1 year ago

Great explanation😄

3 |

@pereganranwei2153

1 year ago

Thanks for this

2 |

@lipinaries

6 months ago

Oh ghosh...Jeff is explains the concept in an awesome and simple way. Love to attend his class f2f someday in Australia

|

@vectorialpx

1 year ago

@IBMTechnology you have very few views and likes for this kind of content. Kudos!

1 |

@podemechamardeperguntas6854

1 year ago

What it the name and model of the transparent whiteboard that you use?

2 |

@jean-charles-attend

1 year ago

Gosh.... Yes ! :/

2 |

@roeniss

1 year ago

Quick question: Is Kerberos a kind of PAM implementation?

1 |

@stock99

3 weeks ago

what happen when PAM got ransomed?

|

@sak2029

1 year ago

😁😁😁

2 |

@zaidal-samaraie6765

2 months ago

This is disingenuous. AD? Password safe? MFA? No. No such thing. Administrators use one account and scribble the password on the wall ...or PAM. There are no other options. Who is this video aimed at?

|

@mohsenjebelli155

3 months ago

Fantastic explanation

|

Go To Top