Many successful cyber-attacks involve the misuse of privileged accounts, and misuse is enabled by inadequate Privileged Access Management (PAM) software, policies, or processes. Some of the malicious activities that must be detected and controlled are abuse of shared privileged credentials, misuse of elevated privileges by unauthorized users, theft of privileged credentials by cyber-criminals, and abuse of privileges on third-party systems, often accessed via the cloud.
PAM has evolved into a stronger and wider risk management discipline as digitalization has increased the attack surface to include cloud, multiple endpoints, working from everywhere, and no secure perimeters. It brings significant benefits to almost every major digital business initiative, including securing applications and data in the cloud, privileged user behaviour analytics to detect anomalous privileged behaviour and supporting endpoint threat protection.