Privileged Access Management Questions

Victoria Smith
User at Yogafun
Mar 11 2021
Hi,
Can someone explain the difference between PAM and PAS?
Thanks.

Kishan KendreHi Victoria,
Please find the difference between PAM and PAS (PIM)
We have… more »
See 1 Answer

Simone Antonaci
User at 2Five1
Feb 19 2021
Kindly advise on the top 5 solutions within the industry to look at.

Kishan KendreHi Simone,
Following are the products which you can look for your requirement.… more »

reviewer1308201Hi Simone,
When we started the PAM journey we POC'ed three vendors based on… more »

reviewer1324719I would first state that you are asking an unqualified question. The PAM tool… more »

Luis Surmay
Copywriter at Gb Advisors
Oct 27 2020
Hi
I am researching Privilege Access Management solutions. I'd like to know if BeyondTrust is considered expensive in comparison to similar solutions?
Any other feedback?
Thanks!

Giovanni PeriniIt depends on a lot of things. We are currently doing a comparison and it… more »

Oluwatosin Soyoye
User at Union Bank PLC
My Bank is currently looking at PAM Solutions.
Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.

Aji JosephPAM solutions worth considering are CyberArc, Centrify, Beyond Trust, Thycotic &… more »

Alex LozikoffI would advise choosing among Gartner MQ Leaders. You are a Bank so the solution… more »

Oleg ShaburovI'd say that everything depends on your detailed requirements. I can tell that I… more »

Menachem D Pritzker
Director of Growth
IT Central Station
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.
Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.
The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.
How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »

Ken ShauretteI like the potential for catching an unusual activity like that with our… more »

Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM)

Paresh Makwana
Director at a tech services company with 1-10 employees
I am a director of a small tech services company.
How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

Idan ShohamFirst, terminology - there really is no such thing as privileged identity… more »

AslamImrozeTypically any new latest PAM comes with a great number of options for… more »
Product Categories
Privileged Access ManagementPopular Comparisons
CyberArk Privileged Access Security
Thycotic Secret Server
Buyer's Guide
Download our free Privileged Access Management Report and find out what your peers are saying about Osirium, CyberArk, Thycotic, and more!
Quick Links
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- What are the top 5 PAM solutions that can be implemented which cover both hybrid and cloud?
- What are the top 5 PAM solutions?
- How will AI and ML help or work with PIM/PAM?
- Is BeyondTrust Endpoint Privilege Management really expensive compared to other tools or software?
- What is the difference between PAM and PAS?