KCOS Logo

Major Use Cases and Capabilities

The top use cases and capabilities that solutions in this market address. Choose your use case for a personalized view on product requirements.

Use Cases

Cyber Security

Hackers and cyber criminals have long targeted unprotected privileged accounts as one of the easiest routes to get inside an organization. This remains the primary purpose of PAM and any platform must be capable of protecting privileged accounts from unauthorised access and stop criminals using privileged accounts as a steppingstone into networks and critical data.

Internal Risk Mitigation

Threats do not come from outside only. PAM also reduces the threat from insider attack and fraudulent behaviour by employees. It reduces the threat of user error such as unauthorized use of shared accounts or lost passwords. It will generate new passwords and rotate them when they are stolen or compromised, which these days could be as often as every week.

MSP Access

Many organizations will use MSPs for IT resources. Increasingly these will involve MSP access to privileged accounts within the client organization so PAM can be used to control this access.

DevOps CI/CD

Businesses and organizations are moving to CI/CD to help advance and accelerate development of processes, applications, and services to become more competitive and reduce costs. To do this, developers and managers will at some point need access to privileged accounts.

Cloud/SaaS Access by Admins

Admins will need access to privileged resources and tools held in private and public clouds. PAM assists in securing access to these resources. Similarly, PAM can assist admins connect to remote users and perform updates and maintenance tasks.

Critical Shared Account Access

Shared accounts are a bad idea. However, setting up single access to privileged accounts is time consuming and hard to manage for larger organizations. PAM is used to secure shared accounts including those that give access to public facing apps such as social media.