Trending

Articles

Identity strategy

Behavioral economics of enterprise password management

When someone asks how you start a typical weekday, your answer likely includes the usual suspects, be it waking up, brewing coffee, or maybe even a quick scroll through the news. But almost inevitably, in the post-pandemic world where remote work has become commonplace, it also includes logging in to work.

By Niresh Swamy

     

Explore all articles

Secrets - The PAM Podcast

Our quarterly newsletter, PAMphlet, shares all the latest PAM updates, from major releases, educational resources, and recognitions to core happenings, current trends in the identity security sector, and everything else that we have cooking in the ManageEngine PAM kitchen.

View previous editions

PAM 101

  • Cloud infrastructure entitlements management (CIEM)

    Cloud infrastructure entitlement management, or CIEM, is a discipline of privileged access management (PAM) to manage and govern privileges or permissions of cloud infrastructure identities.

    Read More

  • Certificate management

    Certificate management is the process of monitoring and managing the life cycles—from provisioning and deployment to tracking renewal, use, and expiration of all certificates.

    Read More

  • Least privileged access

    Least privilege is the process of assigning the minimum amount of privileges to a user that is necessary for them to execute their task efficiently.

    Read More

  • Machine identity management

    Machine identity management (MIM) is the discovery, storage, and governance of critical machine identities responsible for validating the integrity of machines and communication between these machines in the network.

    Read More

  • Principle of least privilege (PoLP)

    The principle of least privilege is an information security framework that aims to provide users with the minimum level of access or permissions required to perform their tasks.

    Read More

  • Privilege elevation and delegation management (PEDM)

    Privilege elevation is exclusive, time-limited access provided by IT teams to standard users who do not normally have permissions to access critical enterprise resources.

    Read More

  • Privileged access management (PAM)

    Privileged access management (PAM) is a cybersecurity strategy and set of principles that is used to secure, manage, and control access to sensitive resources within an organization's network.

    Read More

  • Role based access control

    Role based access control (RBAC) is a privileged access management control that explicitly grants permissions to users based on their roles in an organization.

    Read More

  • Secrets management

    Secrets management refers to the secure storage, management, and restricted access to business-critical credentials, collectively known as secrets.

    Read More

  • Service account management

    Service accounts are privileged domain accounts, which are used by critical applications or services to interact with their operating systems.

    Read More

  • Zero standing privileges

    Zero standing privileges (ZSP) is an IT security term that refers to access privileges or rights that are not permanent.

    Read More

  • Zero trust

    Zero Trust privileged access management (PAM) is a security framework that incorporates fundamental Zero Trust principles to protect privileged accounts and resources.

    Read More

Discover more

Subscription confirmed! You’ll now receive the latest news and updates.