{"id":7763,"date":"2018-11-14T00:00:00","date_gmt":"2018-11-14T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/11\/14\/privileged-access-management-pam-controlling-a-critical-cybersecurity-risk\/"},"modified":"2021-01-28T16:22:14","modified_gmt":"2021-01-28T16:22:14","slug":"privileged-access-management-pam","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/","title":{"rendered":"Privileged Access Management (PAM) Meaning"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>Privileged accounts pose a serious security problem. Anyone who has access to one has the potential to use those administrative privileges to harm your organization in a number of ways, such as altering data, deleting or downloading databases, or creating unauthorized new administrative accounts.<\/p>\n<p>The security risk is not just a theoretical one: Recent security breaches at companies such as Uber, Tesla and Timehop all involved the misuse of privileged account credentials, and in the case of Timehop, led to the loss of 21 million users&#8217; personal information. Privileged access credentials were used by Timehop&#8217;s attacker to create a new administrative user account at the company&#8217;s cloud service provider, and used that new account to conduct further reconnaissance activities in the cloud environment, which ultimately led to the data breach.<\/p>\n<p><strong><em>See our picks for <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">top privileged access management (PAM) products<\/a><\/em><\/strong>.<\/p>\n<h2>What is PAM?<\/h2>\n<p>To address this security risk, Privileged Access Management (PAM) solutions enable you to manage and monitor privileged accounts and the people who have permanent authority to access them. They also provide a secure way to give your staff or third-party contractors temporary, controlled access to privileged accounts, without the need to provide them with an account password that they could reuse at a later date or share with unauthorized parties.<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Identity and access management (IAM) solutions<\/a> control access to user accounts; PAM solutions control access to critical administrative accounts. The PAM market is smaller than the IAM market but growing at a much faster rate. Markets and Markets expects the PAM market to grow at a 33% compound rate for the next few years, reaching $3.8 billion in 2021.<\/p>\n<p>Cloud-based infrastructure and applications are a key driver for companies implementing PAM solutions, because a significant proportion of <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-best-practices\/\">cloud security<\/a> breaches are caused by failure to control privileged accounts effectively. But today the overwhelming majority of PAM solutions manage access to local systems running in corporate data centers.<\/p>\n<h2>Privileged Access Management benefits<\/h2>\n<p>The key benefit of implementing a PAM solution is the reduction in the risk of a security breach, including a breach caused by an insider, and the associated costs of such a breach.<\/p>\n<p>For example, with a suitable PAM solution in place, it becomes possible to provide access in a much more secure fashion to shared accounts, including:<\/p>\n<ul>\n<li>all system-defined default accounts, such as the Active Directory administrator, used by system administrators, and<\/li>\n<li>&#8220;firecall&#8221; accounts intended for after-hours support, which may be used by system and database administrators and application developers.<\/li>\n<\/ul>\n<p>In general, a major problem with these types of shared accounts is that if there is no way to store or communicate passwords securely, they are bound to be compromised, presenting a serious cybersecurity risk.<\/p>\n<p>There is also usually no way of knowing who is using a shared account at a particular time, so there is no audit trail or no user record to merge with event logs,\u00a0 and therefore no accountability.<\/p>\n<p>And even if some sort of secure system for controlling shared passwords is in place, the time delays it can cause may have serious negative consequences for productivity. In emergency situations, time wasted accessing passwords before problems can be mitigated or dealt with could be extremely costly.<\/p>\n<p>A PAM solution can help solve all these problems, leading to better security, a better audit trail if a breach does occur, and much more flexibility in providing privileged access securely to those who need it when they need it.<\/p>\n<p>Increasingly, PAM solution vendors are integrating machine learning and predictive analytics systems into their products to provide privileged access profiling and real-time anomaly detection. If implemented effectively, this should provide another layer of security protection by detecting and flagging suspicious privileged account activity or suspicious privileged user access.<\/p>\n<p>A PAM security solution can also help an organization to:<\/p>\n<ul>\n<li>comply with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">regulatory and audit requirements<\/a><\/li>\n<li>prevent or limit malware attacks that take advantage of privileged accounts<\/li>\n<li>make it quicker and easier for administrators to access privileged accounts<\/li>\n<li>provide secure privileged access to third parties such as contractors, vendors, or cloud service provider engineers.<\/li>\n<\/ul>\n<h2>How does a PAM solution work?<\/h2>\n<p>A typical privileged account management system offers a number of features to control access to key accounts:<\/p>\n<ul>\n<li>Discovering all instances of privileged accounts (both user and application) so they can be managed<\/li>\n<li>Creating procedures and workflows for obtaining privileged access, including requiring <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multifactor authentication<\/a> for privileged access. PAM solutions may provide the multifactor mechanism or integrate with existing multifactor authentication solutions<\/li>\n<li>Making passwords available on-demand to applications, thus eliminating the need for hard-coded ones<\/li>\n<li>Storing privileged account passwords securely and allowing them to be &#8220;checked out&#8221; when needed and &#8220;checked back in&#8221; when the need for that specific account access is finished<\/li>\n<li>Changing passwords automatically, either periodically, or after each use, or when a particular user leaves the company or no longer needs access to a specific account (perhaps because their role has changed)<\/li>\n<li>Controlling and filtering the privileged actions that administrators can execute, depending on their role<\/li>\n<li>Monitoring and recording privileged access sessions, commands, and actions for audit and forensic purposes<\/li>\n<li>Enforcing least privilege policies on endpoints<\/li>\n<\/ul>\n<h2>PAM vs IAM<\/h2>\n<p>Privileged Access Management and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Identity and Access Management (IAM)<\/a> are closely related because both are used to control users and their access to accounts, so both can be thought of as access management systems.<\/p>\n<p>But while PAM solutions are concerned with administrative users and accounts, IAM focuses on standard users (such as general employees and customers).<\/p>\n<p>More specifically, IAM controls standard users&#8217; access to applications, while PAM solutions control the connection between administrators and other privileged users with the role-based accounts that they need to do their jobs. These are often default accounts that exist on systems or applications, and which persist even after a particular individual leaves an organization or moves to another role.<\/p>\n<h2>The emergence of zero trust security tools<\/h2>\n<p>One emerging trend is the rise of <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust security products<\/a>. These new access control tools restrict access to just the data and applications users need rather than granting them access to the broader network, reducing the risk of lateral movement within the network. The market is still new, but Gartner expects sales of these products to begin to gain traction in 2021. PAM tools are likely to evolve to include zero trust principles, rather than being replaced by newer zero trust tools.<\/p>\n<h2>PAM use cases<\/h2>\n<p>All organizations have privileged accounts, including shared accounts, because you can&#8217;t run IT infrastructure and systems without people with the necessary privileges to do system-level tasks.<\/p>\n<p>These may include:<\/p>\n<ul>\n<li>Personal accounts with full, permanent privileges<\/li>\n<li>Personal accounts with full (or restricted) temporary privileges<\/li>\n<li>Personal accounts with limited, temporary privileges<\/li>\n<li>Default application or device accounts that are shared and used by different administrators when the need arises.<\/li>\n<\/ul>\n<p>The first two types are intended for full-time system administrators, while the third type of account with limited, temporary privileges is intended for application developers and database administrators who may need to access specific systems for a defined task or period of time. The shared accounts are likely to be used by administrators working on a specific database or other application.<\/p>\n<p>Let&#8217;s imagine that a developer in your organization needs privileged access to a specific application. A PAM solution can grant that user administrator limited privileges:<\/p>\n<ul>\n<li>by privilege (for example, by regulating the commands available)<\/li>\n<li>by scope (by resources or systems, perhaps)<\/li>\n<li>by time (either by providing privileges for a fixed time period or by time windows)<\/li>\n<\/ul>\n<p>The developer may also need access to a shared application account. In that case, the PAM solution can generate a password for the account that only that developer knows.<\/p>\n<p>While the developer is using the privileged account, all of his or her actions are monitored and logged. On completion, the developer logs out and the password immediately expires, preventing them from sharing the password or accessing the account again without permission from an appropriate authority.<\/p>\n<h2>How to choose a PAM solution<\/h2>\n<p>For companies looking to acquire a PAM solution, Gartner&#8217;s Market Guide for Privileged Access Management offers the following advice:<\/p>\n<ul>\n<li>Shop around: Pricing and feature bundling is highly variable between vendors. Plan for the next three years in terms of systems and functionality covered<\/li>\n<li>Look for integrated high-availability features, built-in multifactor authentication (MFA) and value-priced bundled offerings if you are a small to midsize businesses<\/li>\n<li>Scrutinize vendors&#8217; offerings for MFA integration support, scalability and auto-discovery features if you are a large and global organization<\/li>\n<li>Evaluate vendors on how they can help secure nonhuman service and application accounts \u2014 these accounts are major sources of operational and security risk, and most organizations have a significant number of them<\/li>\n<li>Look for solutions that enable you to deploy session recording as soon as possible, because this capability will add accountability and visibility for privileged activity. Include this capability as part of your selection process<\/li>\n<\/ul>\n<p>The PAM solutions market is maturing and consolidating rapidly, resulting in a high level of M&amp;A activity, including:<\/p>\n<ul>\n<li>CyberArk acquiring Conjur<\/li>\n<li>Thycotic acquiring Cyber Algorithms<\/li>\n<li>CA Technologies (now part of Broadcom) acquiring Mobile System 7<\/li>\n<li>Bomgar acquiring Lieberman Software and BeyondTrust (the combined entity is now called BeyondTrust)<\/li>\n<\/ul>\n<p>Other leading PAM vendors include:<\/p>\n<ul>\n<li>Centrify<\/li>\n<li>IBM<\/li>\n<li>Micro Focus<\/li>\n<li>One Identity<\/li>\n<\/ul>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6e3ca25199-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e3ca25199\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e3ca25199\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e3ca25199\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e3ca25199\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e3ca25199\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e3ca25199\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Privileged accounts pose a serious security problem. Anyone who has access to one has the potential to use those administrative privileges to harm your organization in a number of ways, such as altering data, deleting or downloading databases, or creating unauthorized new administrative accounts. The security risk is not just a theoretical one: Recent security [&hellip;]<\/p>\n","protected":false},"author":226,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[384],"class_list":["post-7763","post","type-post","status-publish","format-standard","hentry","category-applications","b2b_audience-evaluation-and-selection","b2b_product-identity-management-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is PAM? | Privileged Access Management (PAM) Meaning<\/title>\n<meta name=\"description\" content=\"PAM solutions enable you to manage privileged accounts &amp; the authorized people. Learn about its benefits &amp; uses now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is PAM? | Privileged Access Management (PAM) Meaning\" \/>\n<meta property=\"og:description\" content=\"PAM solutions enable you to manage privileged accounts &amp; the authorized people. Learn about its benefits &amp; uses now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-14T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:22:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Rubens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Rubens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\"},\"author\":{\"name\":\"Paul Rubens\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\"},\"headline\":\"Privileged Access Management (PAM) Meaning\",\"datePublished\":\"2018-11-14T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:22:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\"},\"wordCount\":1539,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\",\"name\":\"What is PAM? | Privileged Access Management (PAM) Meaning\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-11-14T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:22:14+00:00\",\"description\":\"PAM solutions enable you to manage privileged accounts & the authorized people. Learn about its benefits & uses now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privileged Access Management (PAM) Meaning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\",\"name\":\"Paul Rubens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"caption\":\"Paul Rubens\"},\"description\":\"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is PAM? | Privileged Access Management (PAM) Meaning","description":"PAM solutions enable you to manage privileged accounts & the authorized people. Learn about its benefits & uses now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/","og_locale":"en_US","og_type":"article","og_title":"What is PAM? | Privileged Access Management (PAM) Meaning","og_description":"PAM solutions enable you to manage privileged accounts & the authorized people. Learn about its benefits & uses now.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/","og_site_name":"eSecurity Planet","article_published_time":"2018-11-14T00:00:00+00:00","article_modified_time":"2021-01-28T16:22:14+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Paul Rubens","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Rubens","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/"},"author":{"name":"Paul Rubens","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c"},"headline":"Privileged Access Management (PAM) Meaning","datePublished":"2018-11-14T00:00:00+00:00","dateModified":"2021-01-28T16:22:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/"},"wordCount":1539,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"articleSection":["Applications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/","url":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/","name":"What is PAM? | Privileged Access Management (PAM) Meaning","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-11-14T00:00:00+00:00","dateModified":"2021-01-28T16:22:14+00:00","description":"PAM solutions enable you to manage privileged accounts & the authorized people. Learn about its benefits & uses now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/privileged-access-management-pam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Privileged Access Management (PAM) Meaning"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c","name":"Paul Rubens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","caption":"Paul Rubens"},"description":"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.","url":"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7763"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7763"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7763\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7763"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7763"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7763"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}