A Solution for Managing Privileged Access
If you are an IT or security specialist in a typical smaller organization, the following scenario will probably have a familiar ring.
A need arises to access some remote servers and virtual machines, each with unique passwords. These machines and the various domains stored on them are accessible by different privileged users. The IT sys-admin knows some of the passwords and some of the users, but not all of them. Emails are sent, phone calls made, Excel spreadsheets and even ‘yellow sticky notes’ are parsed. Eventually IT gains access to the remote servers, but not before a lot of valuable time is consumed. And perhaps more importantly, this process does not occur with the kind of military-grade security practices that today’s hyper-dangerous threat environment demands.
This is the typical ‘fire drill’ that so often arises today in SMBs lacking a user-friendly, effective privileged access management or PAM solution. And, as will be shown, there are a number of factors and dynamics at work making it all the more important for SMBs to have just such a PAM solution in place.
By contrast, most enterprise-class organizations have had PAM solutions in place for some time, either a homegrown variety or one of many purchased from leading PAM vendors. But these comprehensive PAM solutions, which are way beyond the financial means and technical expertise of most SMBs, have their own issues. Most notably, they often are complex and not user friendly.
Read the entire article here, A Solution for Managing Privileged Access
Via the fine folks at Devolutions.