Today, PAM encompasses credential (password, key, etc.) storage and rotation, session monitoring and auditing, least privilege management, remote access, directory bridging, and all the reporting and analytics to make a career for any cybersecurity professional. What is interesting about PAM is that, while each technology listed above can technically operate on its own, they work synergistically when integrated together. If you would like to gain deeper insights into the synergies an integrated PAM solution can confer to your environment, read the new KuppingerCole white paper.

Go to Source of this post
Author Of this post:

By admin