Early-bird Discount
expires in
Register Now


PAM, CIEM, ITDR: What's the Difference and How to Choose Which is Right for Your Business

PAM, CIEM, ITDR: What's the Difference and How to Choose Which is Right for Your Business

Combined Session
Friday, June 07, 2024 14:30—15:00
Location: A 03-04
Watch the video
Log in to download presentations

Choosing the right platform to secure identity access to privileged resources is more challenging. This is partly because of the escalating risk of under protected identities in the cloud and the tendency of bad actors to target those with privileged access. It’s also because the choice of tools has widened. The protection of privileged identities has traditionally fallen to PAM vendors such as CyberArk or BeyondTrust, but in the last few years, the space has widened to include CIEM and ITDR providers who focus on securing identities in the cloud, for development environments and at the edge.

In this session Paul will explain why these newer technologies emerged, why they are important, and the difference between them and traditional PAM. He will share his analysis of how these technologies can be orchestrated to work together and how some are being deployed in a decentralised fashion for specific identity management and protection tasks.

You will learn the fundamental design elements of each of these technologies, how they can protect your identities and which may offer a solution for managing privileged identities in your organization.

Paul Fisher
Lead Analyst
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch