1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Pain in the PAM

Discussion in 'CSO' started by RSS, Oct 11, 2016.

  1. RSS

    RSS New Member Member

    In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns.

    However, a discovery gap between what access has been granted and what users are actually doing has made it difficult to understand security risks and has plagued identity and access management (IAM) for years. This lack of visibility also applies to privileged access. A situation that has been made even worse since few companies have implemented privileged access management (PAM).

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page