20

AIG Pioneers User-Centric Security Strategy

Embed Size (px)

DESCRIPTION

AIG stands out as one of the world’s largest insurance organization with over 88 million customer and 64,000 employees worldwide. AIG Israel, a fully owned subsidiary, supports the company’s intense focus on building the most secure systems possible. AIG Israel is leading the way when it comes to adapting its security needs to modern expectations of keeping their sensitive information, customer data and systems safe. Check out this webinar with Snir Hoffman, an Infrastructure Architect, to learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. AIG Israel has been using ObserveIT for over two years for numerous reasons including third-party vendor monitoring and compliance needs.

Citation preview

Page 1: AIG Pioneers User-Centric Security Strategy
Page 2: AIG Pioneers User-Centric Security Strategy
Page 3: AIG Pioneers User-Centric Security Strategy
Page 4: AIG Pioneers User-Centric Security Strategy
Page 5: AIG Pioneers User-Centric Security Strategy
Page 6: AIG Pioneers User-Centric Security Strategy
Page 7: AIG Pioneers User-Centric Security Strategy
Page 8: AIG Pioneers User-Centric Security Strategy
Page 9: AIG Pioneers User-Centric Security Strategy
Page 10: AIG Pioneers User-Centric Security Strategy
Page 11: AIG Pioneers User-Centric Security Strategy
Page 12: AIG Pioneers User-Centric Security Strategy
Page 13: AIG Pioneers User-Centric Security Strategy
Page 14: AIG Pioneers User-Centric Security Strategy
Page 15: AIG Pioneers User-Centric Security Strategy
Page 16: AIG Pioneers User-Centric Security Strategy
Page 17: AIG Pioneers User-Centric Security Strategy
Page 18: AIG Pioneers User-Centric Security Strategy
Page 19: AIG Pioneers User-Centric Security Strategy