Try our new research platform with insights from 80,000+ expert users
2021-12-11T16:53:00Z

What is Privileged Account Management (PAM) and How Does It Work?

Shibu Babuchandran - PeerSpot reviewer
  • 51
Published:Dec 11, 2021
Search for a product comparison in Identity Management (IM)
PeerSpot user
PeerSpot user
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: July 2025.
865,140 professionals have used our research since 2012.
Related Questions
Ariel Lindenfeld - PeerSpot reviewer
Mar 19, 2024
Mar 19, 2024
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects: Security enhancements Regulatory compliance User access control Efficiency improvements Cost reduction Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, whic...
See 1 answer
RA
Mar 19, 2024
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects: Security enhancements Regulatory compliance User access control Efficiency improvements Cost reduction Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, which significantly heightens security. Implementing effective IM systems minimizes the risk of identity theft and reduces exposure to data breaches. With IM solutions, companies can enforce policies ensuring that only authorized personnel have access to critical assets. This is accomplished through multi-factor authentication, role-based access control, and periodic audits. By restricting access based on roles and responsibilities, organizations can better protect sensitive information.Regulatory compliance is another vital aspect of Identity Management’s importance to businesses. Many industries are governed by stringent regulations requiring rigorous identity verification and data protection protocols. IM systems help businesses meet compliance standards such as GDPR, HIPAA, and others by providing detailed access logs and management. This ensures that companies are prepared for audits and reduces liability related to non-compliance. Additionally, the automation of user management processes through IM can lead to increased efficiency, reducing manual workloads and associated costs. Efficient identity solutions streamline user provisioning and de-provisioning, enhancing operational agility and reducing the risks of outdated or incorrect user access.
EB
Aug 5, 2025
Aug 5, 2025
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on: First, we have to tackle phishing beyond just email. Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "...
See 2 answers
LN
Aug 10, 2022
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all employees. Any technical solution is not good enough to avoid willing leak of employee credentials by themself.
HA
Aug 5, 2025
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on: First, we have to tackle phishing beyond just email. Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "your password expired" or "your schedule changed." Classic urgency tactics. What we need: Regular training that actually covers SMS and voice phishing scenarios. Not just the standard "don't click suspicious links" email training we've all sat through a million times Work with telecom providers to get some SMS filtering in place (yeah, it's harder than email filtering, but it's necessary) A simple rule: If someone texts you asking for credentials, pick up the phone and call IT directly. Old school verification still works Second, we need to get serious about access management. This is where Zero Trust and IGA come into play. Basically, stop trusting anyone by default - even your employees. Here's what actually works: Lock down access based on context. If Bob from accounting suddenly logs in from Romania at 3 AM, maybe don't let him access the financial systems? Time-based access is huge. Why does anyone need 24/7 access to sensitive systems? Give people access during their work hours, from their usual devices Get rid of SMS-based MFA yesterday. Hardware keys aren't sexy, but they work. Twilio learned this the hard way Keep privileges tight. Does Sarah really need admin access to that system she uses once a quarter? Probably not. Give her temporary access when she needs it The bottom line? Even if someone steals credentials through phishing, they shouldn't be able to waltz into your systems. Make them jump through hoops - legitimate users won't mind the extra security if you explain why it's there. These aren't revolutionary ideas, but the Twilio breach shows we're still not doing the basics right. It's time to stop treating security as a checkbox exercise and actually implement these controls properly.
Download Free Report
Download our free Access Management Report and find out what your peers are saying about Microsoft, Auth0, Ping Identity, and more! Updated: July 2025.
DOWNLOAD NOW
865,140 professionals have used our research since 2012.