“... Granularly control which commands and tasks each IT administrator is permitted to execute based on role, to effectively segregate duties and reduce the risk....”
https://lp.cyberark.com/rs/cyberarksoftware/images/ca-endpoint-privilege-manager-ebook-21-10-16-final-en.pdf
No comments:
Post a Comment