Privileged Access Management (PAM) is a security process, now available in Microsoft Identity Manager (MIM).
Systems admins are privileged users and are targeted by hackers as they often have access to all areas of an IT infrastructure. Once a hacker has hijacked a privileged user account, they have free-rein. PAM can keep safe those who have the keys to your kingdom. PAM has powerful permissions which protect systems administrators from hackers and reduce the threat and impact of cyber attacks, and offers detailed management of administrative, or privileged, permissions.
PAM is not something you can just tick a box to activate. It’s a process which needs careful implementation. You may wonder if PAM different to PIM? It’s not.
Lots more information about Privileged Access Management here!
- Discover more in this recording of a webinar ‘Introducing Privileged Access Management’ broadcast in July 2016.
- Download our PAM white paper. In this 9-page pdf, we describe PAM’s features and concepts, its architecture and structures, and I discuss some design considerations for deploying PAM in the real world.
- And if you want to discover even more, then get some PAM training.