Category: pam

PAM remote access

Secure Remote Privileged Access

With a large portion of the workforce suddenly shifting to a remote model, secure remote access is in critical demand, stretching resources thin.  As a former IT security team leader in a large corporation, my toughest challenge was getting vendors’ access to critical systems in a timely fashion.  In most cases, it took more time
Read More

Auditing IT Administrators with Privileged Access Management

Identifying and understand privileged identities within your organization is a daunting task. Managing, auditing and keeping the privileged account inventory up-to-date is even more challenging depending on the size and complexity of your IT footprint. Privileged accounts should be audited on a regular basis and organizations should understand what types of privileged access are being
Read More

Unix & Privileged Access Management (PIM or PAM)

As the number of cyber-attacks increase, the need for organizations to increase their security posture has become more evident. Securing and managing privileged accounts by implementing a robust Privileged Identity & Access Management (PIM or PAM) must be a high priority. Privileged Users Privileged Users are identities that have the capability of performing administrative functions,
Read More