Inside the Briefcase

As the Network Changes, Engineers Are Embracing the DevOps Model

As the Network Changes, Engineers Are Embracing the DevOps Model

Businesses that have embraced digital transformation with a clear...

The 5 Most Common Application Bottlenecks

The 5 Most Common Application Bottlenecks

Application bottlenecks can lead an otherwise functional computer or...

How Machine Learning Helps Improve the Security Industry

How Machine Learning Helps Improve the Security Industry

We’ve been moving more and more towards computerized processes...

Transformation on a Global Scale

Transformation on a Global Scale

Necessity may be the mother of invention, but it’s...

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

IT Briefcase Exclusive Interview: As Container Adoption Swells, So Do Security Concerns

Fei Huang, NeuVector
In this Fresh Ink interview segment,...

Market Overview: Privileged Identity Management

June 13, 2011 No Comments

by Andras Cser – Forrester Research, Inc.

Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It’s used primarily for managing system administrator activity in highly sensitive environments, such as production databases, domain controllers, and network infrastructure equipment. In the past, controlling distribution of passwords to these environments was enough, but today, auditors have started to pay much closer attention to what administrators actually do in these environments. Auditors now want to monitor, record, and control administrator actions to the finest level of detail possible. This has forced many changes in PIM architecture. Vendors must now provide more robust features and capabilities in their product stack, such as secure channels, provisioning integration, credentials distribution, sensitive entitlement enforcement, session recording, and auditing. To support risk models in IT administration, Forrester expects that PIM architectures will evolve in the future to encapsulate fraud management and pattern recognition.

Download Report

This report is being offered compliments of NetIQ.

Featured White Papers, SECURITY, Top Stories

Leave a Reply

(required)

(required)


ADVERTISEMENT

UC Expo

SSOW

sptechcon

ITBriefcase Comparison Report