How Privileged Access Management Fits Into a Layered Security Strategy

This article has been indexed from Security Intelligence

In its early stages, privileged access management (PAM) involved protecting only the passwords used for privileged accounts. But it evolved beyond that single purpose in the years that followed. Nowadays, it includes other security functions like multifactor authentication (MFA), session monitoring, proxying and user behavior analytics (UBA). Take a look at how these connect for […]

The post How Privileged Access Management Fits Into a Layered Security Strategy appeared first on Security Intelligence.

Read the original article: How Privileged Access Management Fits Into a Layered Security Strategy