• HOME

  • SERVICES

  • BLOG

  • ABOUT

  • More

    Matt Leiv

    The 3 Pillars of Cloud

    April 18, 2018

    Are you 100% confident your backups are recoverable?

    April 18, 2018

    The greatest pdf you’ve never read

    April 18, 2018

    The History of Video Conferencing

    March 19, 2018

    What is gray market and will it hurt your business?

    March 19, 2018

    New Security Needs: PAM demand grows 33% says Gartner

    March 12, 2018

    Phrases to avoid in customer service

    March 12, 2018

    Why you should be more genuine in your communication

    April 19, 2017

    What I learned in the military: Part 2

    July 28, 2016

    No one cares about your “free stuff”

    June 2, 2016

    Please reload

    Recent Posts

    Phrases to avoid in customer service

    March 12, 2018

    1/1
    Please reload

    Featured Posts

    New Security Needs: PAM demand grows 33% says Gartner

    March 12, 2018

    |

    Matt Leiv

     

    PAM stands for privileged account management, not the cooking spray. Security has grown far beyond the classic install a “security box” and let everything be protected. A more recently exploited aspect of security by hackers and unhappy recently released employees is the exploitation of passwords to the critical IT systems. As of 2016 Gartner reported this sector is growing at 33% annually.

     

    “1 in 3 hackers say accessing privileged accounts is the easiest and fastest way to get at sensitive data” ~Thycotic

     

    A few things PAM does for IT departments are; control who has access to a company’s most critical IT information, manage and monitor that control to make sure non-designated individuals are not accessing privileged systems, revoking access rights in real time upon employee termination or detection of an attack, increase security making it harder for attackers to penetrate a network, reset and manage passwords for different groups across all devices including mobile devices.

     

    The larger your company, as well as the smaller the IT team to employee ratio, the longer these tasks can take if done manually. Also, depending on industry and compliance variables, manual changes may result in failed audits. PAM software can fully automate most of the work, depending on which type of solution you consider. Like all security areas, there are a lot of options from lower end and free to higher end and highly secure enterprise grade solutions.

     

    The prime variables to consider from my experience are; feature sets needed, total cost of ownership over time, level of security, integration with current environment and software, product reputation and performance in the market.

     

     

     

    Tags:

    technology

    security

    cyber security

    PAM

    business

    Please reload

    Follow Us

    PAM

    adobe

    aws

    azure

    b2b

    backup

    barracuda

    blog

    bluebeam

    business

    cloud

    communication

    customer service

    cyber security

    dell

    determination

    disaster recovery

    discipline

    dr

    fight

    free

    health

    hp

    intel

    leadership

    management

    meetings

    military

    motivation

    pdf

    relationships

    revu

    sales

    salestips

    security

    storage

    success

    summer

    technology

    tuesday

    unitrends

    veeam

    video

    videoconferencing

    virtualization

    will power

    work

    Please reload

    Search By Tags

    April 2018 (3)

    March 2018 (4)

    April 2017 (1)

    July 2016 (1)

    June 2016 (3)

    September 2015 (1)

    Please reload

    Archive
    • Facebook Basic Square
    • Twitter Basic Square
    • Google+ Basic Square
    • LinkedIn
    • Facebook