CHAPTER 1
Getting to Know Privileged Access Management 3
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Getting to Know Privileged Access ManagementPrivileged accounts are everywhere in the IT environment. They give IT the building blocks for managing vast networks of hardware and software that power the information-driven world.
Yet for most people, they’re invisible. This chapter gives you the basics of Privileged Access Management PAM) — understanding privileged accounts, what they do, and why it’s so important to protect access to them as the keys to the kingdom of your growing information empires.
Share with your friends: