What is Privileged Access Management and how does it improve my security?

Posted by John Ryan
on 10-Apr-2019 07:17:00

cloud buildings

Privileged user accounts provide advanced access rights to critical systems and sensitive data. They are like VIP passes to a show – only the select few have them.

These accounts appeal to hackers because this access can give complete and unlimited access to your systems and data. They can then stealthily move throughout the network to compromise other systems within the breached environment.

In fact, recently Microsoft confirmed that hackers gained access to MSN, Outlook and Hotmail via a compromised user's credentials.

The Forrester Research Privileged Identity Management, Q4 2018 report estimates that 80% of data breaches involve theft of privileged credentials, such as passwords, tokens, keys and certificates.

How does PAM improve my security?

PAM or Privileged Access Management reduces the risk of these credentials being stolen. It helps organisations provide secure, privileged access to critical assets and enables them to:

  1. Discover privileged accounts on systems, devices and applications
  2. Automatically manage passwords and other credentials
  3. Control access to privileged accounts
  4. Isolate, monitor, record and audit privileged access sessions

Many organisations focus time and money on managing regular user accounts and underestimate the importance and risk presented by privileged accounts. Exploits of these accounts often begin with phishing schemes but they can also be via third parties’ digital access. A PWC survey found that 41% of privileged account incidents were via third-party business partners compared to 29% through current employees.

Zinopy partners with CyberArk, a leader in this space as stated by both Forrester and Gartner to provide you with the best privileged user account protection available.

Topics: Security

Written by John Ryan

John Ryan has over 25 years’ experience in the IT industry gained in high profile roles in the IT Security market with Entropy, Calyx and as founder and CEO of Zinopy. He has a breadth of technical experience in all areas of networking and security, with a particular focus on data security and enterprise risk management. John is a regular speaker at industry events.
Find me on: