All Research
Whitepaper
Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no longer need access or simply giving too many people privileged accounts. Criminals and hackers are becoming more adept at stealing and using credentials for privileged accounts. To reduce this risk, and uphold GRC obligations within an organization, a suitable PAM solution is needed to manage these security challenges.

Commissioned by Devolution

1 Introduction

The pressure on organizations to transform and digitize to create new products and services has meant different processes and technologies are entering the workplace, and some are creeping in without a strategy to manage them. These include trends such as Cloud, AI, Process Automation, IoT, DevOps, and XaaS (Anything as a Service). These trends are not confined to large enterprises but companies of all sizes, including Small to Medium sized Businesses (SMBs).

Taken together, these trends and technologies offer big opportunities for companies and organizations to ensure they remain competitive, but they also need to manage them and ensure they do not increase security and data risks. This is especially true of the massive increase of data and access points offered by these technologies which while enabling the digital change needed, can also increase the risk of access being hijacked by hackers, criminals or hostile state actors.

The key components of a comprehensive PAM solution.  SMBs would not necessarily need all of these. (Source: KuppingerCole)
Figure 3: The key components of a comprehensive PAM solution. SMBs would not necessarily need all of these. (Source: KuppingerCole)

The modern infrastructure therefore requires access be granted to data and IT services to a wide variety and increasing number of stakeholders. These include traditional line employees, admins and managers but now also individuals from partner organizations, contractors and even customers. Some of these will request and need access to critical assets in order to fulfill their roles: these are known as privileged users.

Identity and Access Management (IAM) systems have long been used to manage access to data and services for less critical parts of the business: enabling employee sign on to workstations is one example. From IAM came a subset technology called Privileged Access Management (PAM) which was originally designed simply to manage passwords or two factor authentication (2FA) for critical assets across the organization. Until recently those with privileged access and more basic access were easy to manage as roles and access requests did not change all that much.

Digital transformation has changed the landscape. Today data access is lot less binary and much more fluid. Employees and other stakeholders may need privilege access to complete a certain task and then no longer need it. Contractors may be onsite for a short time also needing privilege access accounts, or when working remotely or at a subsidiary site. The increased exposure to data and critical assets has meant the threat of unauthorized access has been elevated, and modern PAM solutions must do as much as possible to prevent security breaches, as well as provide efficient speedy access to those who need it, when they need it – and more importantly deny it when no longer needed. It goes without saying that the digital landscape has made this a much more challenging market for PAM vendors and has transformed PAM into something much more than a simple administration tool. Done well, a PAM investment installation can increase business efficiency and competitiveness for an SMB.

Given the complexity and speed of change of the modern organization any PAM solution must do more than simply provide privileged account access. It needs to be capable of monitoring access from an easy to understand central database and be able to reach into the extended network so that third parties, contractors and remote workers are monitored and given the right access when they need it. The best PAM solution must also go further and allow different tiered access of privilege so that line managers can grant access to certain employees and groups.

While credential vaulting, password rotation, controlled elevation and delegation are important, modern PAM should also offer privileged user analytics, risk-based session monitoring and advanced threat protection. It should also be able to flag suspicious behavior with blocking procedures automatically activated by PAM without need for human intervention, once red flags have been set.

In recent years, the perception of Privilege Management has changed considerably, and many vendors have entered the market. Many obviously target the large enterprise market but the SMB market is now also being catered for. While the scale may be different, smaller businesses are undergoing similar digital changes as bigger companies and in unique ways. Often, they act as the pivot between one organization and another and act as vital partners in digital supply chains. Therefore, they have similar identity and access challenges as they also seek to manage privileged accounts for their own employees, contractors and those of the businesses they are working with. Some SMBs will of course also be serving as managed service providers to bigger organizations, in which case security of data is paramount.

But while the PAM challenges might be similar, the solutions for smaller businesses may need to be different in scale and feature set. This whitepaper sets out why SMBs should now consider PAM, what are the essential components of PAM for SMBs and how new features and trends are making PAM easier for SMBs. It also provides SMB decision makers an overview of best practice in deploying and running a PAM solution that is fit for purpose and scalable.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Register
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use