Privileged Access Management Questions
Evgeny Belenky
IT Central Station
Apr 30 2021


Please share your expertise and experience with the community on how to start implementing a Zero Trust model in an enterprise.

Thank you!

ABHILASH THWhat is zero trust? Assume zero trust when someone or something requests… more »
Victoria Smith
User at Yogafun
Mar 11 2021


Can someone explain the difference between PAM and PAS?


Kishan KendreHi Victoria, Please find the difference between PAM and PAS (PIM) We have… more »
Simone Antonaci
User at 2Five1
Feb 19 2021

Kindly advise on the top 5 solutions within the industry to look at. 

Kishan KendreHi Simone, Following are the products which you can look for your requirement.… more »
reviewer1308201Hi Simone, When we started the PAM journey we POC'ed three vendors based on… more »
reviewer1324719I would first state that you are asking an unqualified question. The PAM tool… more »
Luis Surmay
Copywriter at Gb Advisors


I am researching Privilege Access Management solutions. I'd like to know if BeyondTrust is considered expensive in comparison to similar solutions? 

Any other feedback?


Giovanni PeriniIt depends on a lot of things. We are currently doing a comparison and it… more »
Oluwatosin Soyoye
User at Union Bank PLC

My Bank is currently looking at PAM Solutions.

Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.

Aji JosephPAM solutions worth considering are CyberArc, Centrify, Beyond Trust, Thycotic &amp… more »
Alex LozikoffI would advise choosing among Gartner MQ Leaders. You are a Bank so the solution… more »
Oleg ShaburovI'd say that everything depends on your detailed requirements. I can tell that I… more »
Menachem D Pritzker
Director of Growth
IT Central Station

On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.

Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.

The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.

How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
Ken ShauretteI like the potential for catching an unusual activity like that with our… more »
Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM) 
Paresh Makwana
Director at a tech services company with 1-10 employees
May 21 2021

I am a director of a small tech services company.

How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

Idan ShohamFirst, terminology - there really is no such thing as privileged identity… more »
AslamImrozeTypically any new latest PAM comes with a great number of options for… more »