A set of strategies and technologies for controlling, monitoring, and securing elevated access rights to critical systems and data. PAM solutions manage and audit privileged accounts to reduce the risk of insider threats and credential theft.
Related Terms
Identity and Access Management (IAM)
authenticationA framework of policies and technologies for managing digital identities and controlling access to resources. IAM ensure...
Insider Threat
social-engineeringA security risk that originates from within the organization, including current or former employees, contractors, or bus...
Zero Trust
authenticationA security model based on the principle of never trust, always verify. Zero trust requires strict identity verification...