Advertisement

Sample Privileged Access Management Use Cases

  • Morey J. Haber
Chapter
  • 73 Downloads

Abstract

A threat actor thrives on the weakness of processes and the inability of an organization to establish best practices or even follow processes. To that end, privileged access management can stymie a threat actor, even if other security best practices are not being fully followed. Consider these top three problems almost every organization faces:

Copyright information

© Morey J. Haber 2020

Authors and Affiliations

  • Morey J. Haber
    • 1
  1. 1.HeathrowUSA

Personalised recommendations