Choosing the right platform to secure identity access to privileged resources is more challenging. This is partly because of the escalating risk of under protected identities in the cloud and the tendency of bad actors to target those with privileged access. It’s also because the choice of tools has widened. The protection of privileged identities has traditionally fallen to PAM vendors such as CyberArk or BeyondTrust, but in the last few years, the space has widened to include CIEM and ITDR providers who focus on securing identities in the cloud, for development environments and at the edge.
In this session Paul will explain why these newer technologies emerged, why they are important, and the difference between them and traditional PAM. He will share his analysis of how these technologies can be orchestrated to work together and how some are being deployed in a decentralised fashion for specific identity management and protection tasks.
You will learn the fundamental design elements of each of these technologies, how they can protect your identities and which may offer a solution for managing privileged identities in your organization.