PAM is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work?
Our Privileged Access Management White Paper explains
PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks.
PAM addresses an all-too-frequently neglected problem, the detailed management of administrative (privileged) permissions. Admin permissions are privileged and PAM gives them security superpowers. In other words, PAM can keep safe those who have the keys to your kingdom. Many recent well-publicized hacking attacks have specifically targeted system administrators, and once they’ve gained access to administrative credentials, they have create further accounts with extensive permissions, waiting for the right time to attack.
Organizations must take action to combat attacks by:
- preventing theft of administrative credentials, as far as possible
- controlling the process of creation and authorization of administrative credentials
- monitoring administrative groups to detect misuse, and
- responding swiftly and appropriately to evidence of misuse.
PAM’s has administrative architecture and features to make each of these steps possible.
DOWNLOAD OUR WHITE PAPER
In our Privileged access management white paper, a nine-page pdf, I describe PAM’s features and concepts, its architecture and structures and I discuss some design considerations for deploying PAM in the real world. Download for free with this form: