May, 2025 Issue 12
ManageEngine PAM
We wish you and yours a very happy May Day and a prosperous rest of the year!
The trinity of automation, AI, and PAM
Hear ye, hear ye,
It has been some time since our last correspondence.
We come bearing news of advancements from distant markets, innovations powered by the alchemy of AI, and the growing influence of automation to aid thee in thine access security ventures. Within this scroll, thou will also find accounts of the gatherings we've held across the continents and word of future assemblies where thy presence would be most welcome.
The year 2025 unfolds with great promise for the ManageEngine PAM team. We look forward to sharing all that lies ahead and equipping you with the tools and insights to stay ever ahead in your domain.
Let this serve as thy summons to all that is new and beyond.
Proclamations of note
We’ve laid out a rich table of enhancements for your benefit. Herein lies a closer examination of what we're bringing forth.
Privileged task orchestration
In this age of swift alliances, where enterprises enlist a great many third-party vendors, the gatekeepers of privileged access are burdened with granting and rescinding access to temporary administrative accounts. PAM360’s task orchestration module, powered by Qntrl, eases this load by automating routine privileged tasks across a wide range of endpoints and applications. This not only improves operational efficiency but also upholds security best practices.
With task orchestration, enterprises can reduce manual effort, reclaim valuable admin hours, and guard against standing privileges and the creeping risks they bring.
Take a moment to give this feature a closer look
AI-governed least privilege access
In these times of vast and varied hybrid and multi-cloud environments multiplying both human and non-human identities, the challenge of managing access grows ever more complex, and the threat of privilege sprawl spreads unchecked. To defend against this, organizations require policies that are dynamic and capable of wisely upholding the principle of least privilege across their entire identity landscape.
Behold: The CIEM module of PAM360 now brings forth AI-crafted least privilege policies, automated remedies for shadow admin risks, and real-time summaries of access and sessions. With these AI-driven abilities, organizations can now combat access sprawl and misconfigurations across their hybrid domains with minimal toil.
Reveal the full tale
Release radar
PAM360

Automatic upgrade for PAM360 agents

Privileged task automation

AI-powered insights

Session recording for website connections

macOS agent

LGPD compliance report
Key Manager Plus

Ticketing system integration

CMDB integration
Conference corner
Throughout the year so far, we've traveled far and wide, meeting with valued patrons such as thyself and learning from every exchange. The insights shared on thy PAM practices were of great worth, and we now endeavor to channel all we’ve gathered into forging a PAM suite that is more secure, more intuitive, and better suited to thy needs.
As we journey further into the year, our scroll of upcoming gatherings is already rich with opportunity. We would be most pleased to meet again to learn of the new challenges you face and continue the dialogue we began with renewed purpose.
Join us at an event near thy dwelling
Resource library
Our team has thoughtfully gathered content over the year so far to address key challenges, from compliance concerns to implementation hurdles, and show how PAM can help ease these burdens.

Align with the PCI DSS using PAM

Learn More

Not another one-size-fits-all PAM maturity model

Read More

The one-stop PAM checklist for all your cyber insurance needs

Get cyber-insurance-ready

Ensuring compliance with the NIS2 Directive using PAM

Learn More

Insights curated for you
From behavioral economics and psychology to the philosophy of enterprise password habits and workforce routines, we’ve gathered a selection of writings that we believe will scratch thine ITch:
Behavioral economics of enterprise password management
7 mental health dilemmas and tips for the modern workforce
Why your strongest security tool is still a weak password
The emotional privacy paradox: Strategic considerations for enterprise AI
Thus, we come to the end of this scroll.
If thou hast read thus far, we thank thee and would be glad to hear thy thoughts. Send word our way! Tell us what thou would like to see in future editions or share a tale from thine own PAM journey.
Until we meet again, may the year bring success and good fortune to thee and thine.
Cheers,
The ManageEngine PAM team