Control of privileged users
Control of privileged users, or Privileged Account Management (PAM) is a group of the solutions intended for implementation of monitoring and control of accounts of staff of IT divisions, system administrators, the staff of the outsourcing organizations, which are engaged in administration of infrastructure of the company, management of authentication and authorization of the specified employees, audit of the performed operations, access control and record of their sessions. In addition to an abbreviation of PAM for designation of control systems of privileged users, other names of this class of solutions meet, for example
- Privileged User Management (PUM),
- Privileged Identity Management (PIM),
- Privileged Access Management (PAM),
- Privileged Password Management (PPM),
- Privileged Account Security (PAS).
Solutions of the class Privileged Access Management are intended for risk reduction, the exclusive accounts connected with unauthorized use. At the same time not only accounts of the administrators (servers, network equipment, workstations) having access to management of IT infrastructure elements, but also business users who have access to confidential data of the company and also users who need changeable exclusive access, for the period of the project, for example belong to exclusive records.
You See Also:
- Cybersecurity - Authentication Directory of solutions and projects
- Passwords
- Access control system in the company: how to select, implement and to be disappointed. TADetails
- The systems of identification and access control to information resources of the enterprise - IDM (the market of Russia)
- The systems of identification and access control to information resources of the enterprise - IDM (world market)
- Identity and Access Management is determinations
- Adaptive IAM: Defending the Borderless Enterprise (Adaptive systems of IAM: protection for the enterprise without borders)
- Multifactor (two-factor) authentication
- Means of enciphering
- Information loss preventions there is Data Loss Prevention (DLP)
- Backup and data storage
- Reflections of local threats there is Host Intrusion Prevention Systems (HIPS)
- Confidential information protection from internal threats is Information Protection and Control
- Anti-virus software solutions
- Firewalls
- Biometric identification
- Technologies of biometric identification
- ACS - Control and management systems for access
- Video surveillance systems
- Corporate mobility (Bring Your Own Device - BYOD)