298 Protecting the VM Environment With a New Modernized Approach
Project and Program:
z/VM Systems Programming
Tags:
Proceedings,
2025,
SHARE Cleveland 2025
Stay one step ahead of the most sophisticated threats to your organization by
protecting against dangerous breaches and unwanted access.This new, end to end
approach, provides an interface between SRM and a Privileged Access Manager to
fortify Administrative credentials, control user access, simplify MFA, and
monitor user activity. In this session, you'll understand combining rules of
password management with safety of a credential vault.
Back to Proceedings File Library