Privileged account management challenges: comparing PIM, PUM and PAM
CyberSecurity Insiders
NOVEMBER 18, 2021
Regardless of the user authentication mechanism used, privileges must be built into the operating system, file system, applications, databases, hypervisors, cloud platforms, network infrastructure. The concept of PIM, in contrast to PAM, is aimed at managing existing accounts: administrator, root, etc. Issues with terms.
Let's personalize your content