Home / Educational Content / PeopleSoft / RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft

RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft

While phishing attacks on self-service users are a significant threat to PeopleSoft environments, the compromise of privileged user and third-party credentials poses the most severe risk.
To make matters worse, most PeopleSoft Admin and IT Teams use shared credentials, which makes investigation of any security incident that much more complicated. It’s these moments when putting a face/name of a person to a specific action is of the utmost importance.
Join us as PeopleSoft Security expert, Greg Wendt discusses and demonstrates PeopleSoft Privileged Access Management (PAM) by Pathlock.

Watch the full-length video

Premium Content: access is limited to Quest Corporate and Professional members.

Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.

RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft