Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi.
This talk looks at the result from penetration testings of PAM systems at major enterprises and highlights some of the issues we have encountered. The talk also discusses typical architectural challenges and trade offs especially around how you integrate your PAM solution into your identity management and identity governance solution.
Key takeaways:
Compromising privileged accounts can lead to loss of valuable information. Therefore, Privileged Access Management is becoming a top priority for enterprises. Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific solutions.