- Recorded Date:Nov. 2, 2021
- Event:On Demand
Privileged Access Management solutions are key components to organizational security policies and have been protecting our most critical assets for a few years. Although much of the technology is cutting-edge and new, the concept of privileged user management has been around for quite some time.
This session will take a brief look at where and why PAM originated, the state of current privileged access management technology, and a look to the future and the new requirements and capabilities of privileged access management.