Featured guest
Privileged access management (PAM) is a specialized branch of identity, authentication, and access technology, designed for managing users’ access rights to critical corporate resources. IT administrators and senior management users often need these access rights, but the increasing use of cloud environments and IoT requires higher security permissions. Granting this access via interaction with API calls can be accomplished without human intervention, which reduces the possibility of errors, by utilizing an efficient PAM solution.
The need to allow broader use of privileged access rights seems contrary to many organizations’ high-priority Zero-Trust Access (ZTA), and risk and compliance management initiatives, but using PAM helps accommodate these requirements
Alan Rodger has worked in industry analyst roles for almost 20 years, supporting clients mainly by writing, advising, or speaking on IT governance and security, as well as other tech and business topics. His broad focus is on enabling vendors, service providers, and enterprises to understand the essential linking of security requirements to business drivers. This has expanded into key content on the topics of: