"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Market Overview: Priviledged Identity Management

White Paper Published By: NetIQ
NetIQ
Published:  Jul 07, 2011
Type:  White Paper
Length:  15 pages

Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It’s used primarily for managing system administrator activity in highly sensitive environments, such as production databases, domain controllers, and network infrastructure equipment. In the past, controlling distribution of passwords to these environments was enough, but today, auditors have started to pay much closer attention to what administrators actually do in these environments. Auditors now want to monitor, record, and control administrator actions to the finest level of detail possible. This has forced many changes in PIM architecture. Vendors must now provide more robust features and capabilities in their product stack, such as secure channels, provisioning integration, credentials distribution, sensitive entitlement enforcement, session recording, and auditing. To support risk models in IT administration, Forrester expects that PIM architectures will evolve in the future to encapsulate fraud management and pattern recognition.



Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, encryption

Browse Technology Topics

    
    
    
    
    
    
Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory