Determining the Best Approach to PAM for You

Determining the Best Approach to PAM for You

 

Privileged Access Management (PAM) tools for IT and network infrastructure have been available for more than thirty years.  As these tools have evolved, two methodologies have emerged, both with the goal of regulating and protecting privileged accounts.

This webinar will explore the two main approaches to PAM. First, Privileged Account and Session Management (PASM), which is chiefly a password-based gateway solution between the operator and the system(s) they administer. The second approach is Privilege Escalation and Delegation Management (PEDM), which is primarily an end-point solution installed on servers and network devices.

Ideal for IT Operations, DevOps, or IT security/audit staff, you’ll leave this webinar with key takeaways on:

  • Mapping to common regulatory environments
  • Difficultly level in subverting these two solutions
  • Multi Factor Authentication integration
  • The death of passwords as an authentication mechanism by 2020


Watch this webinar for an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.