We just raised a $30M Series A: Read our story
2020-05-20T14:44:00Z

How will AI and ML help or work with PIM/PAM?

58

I am a director of a small tech services company.

How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

ITCS user
Guest
34 Answers

author avatar
Top 20Real User

First, terminology - there really is no such thing as privileged identity management. PAM systems broker access to existing accounts and other entitlements - they do not normally create or manage the lifecycles of identities (login accounts, etc.) which is what identity management means. That's just a misnomer introduced and later abandoned by some vendors.

As for the link between ML/AI and PAM - it is basically to identify unusual but authorized access and trigger either extra authorization or at least alerts.
It's normal that John connects to root on the Linux server M-F in the morning, but it's really strange at 3AM on Saturday, so invite John's manager to approve the odd-looking request.

2020-05-21T14:55:54Z
author avatarTimothy Shear
User

@Idan Shoham PIM could mean the Identity Management itself is controlled by privileged access controls. We have a secure configuration storage solution that would provide just such an implementation. Control of access to the Identity Management process could be controlled by our platform.

author avatar
Reseller

Typically any new latest PAM comes with a great number of options for automation. Integration with JSON scripts is also possible. It depends on what is the use case you want to achieve. If an ML can trigger AI to send some request to PAM then based upon the input received and configured automation rules in PAM the action will be taken. BeyondTrust PAM can do this.

2020-05-21T13:42:20Z
author avatar
Top 5LeaderboardReseller

AI & ML helps in proactive threat intelligence modules, risk rating. Also, to automate operations. For eg CyberArk has a module names PTA ( privilege threat analytics )

2021-05-21T08:07:18Z
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: December 2021.
554,529 professionals have used our research since 2012.