For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Poor PAM processes and policies leave the crown jewels susceptible to security breaches

Take a look at the eye-opening findings about privileged account management (PAM) practices in One Identity’s global survey of IT security professionals. The results are interesting, concerning and surprising. Despite that approximately 80 percent of all breaches involve privileged credentials, it turns out that far too often PAM practices range from antiquated to primitive – including using spreadsheets or paper logs to manage PAM accounts.

The survey data covers many aspect of PAM, including management tools, monitoring capabilities, and password management. Here’s a sampling of key findings:

  • 18 percent of respondents admitting to using paper-based logs to manage privileged credentials
  • A surprising 36 percent use spreadsheets to manage privileged credentials
  • Plus, two-thirds (67 percent) of organizations rely on two or more tools to administer these accounts, which indicates widespread inconsistency in how privileged access is managed

To read details on these results and more, get our Key Findings document.