Privileged Identity Management protects user accounts via PIM Solutions - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Privileged Identity Management protects user accounts via PIM Solutions

Description:

Privileged Identity Management (PIM) is subcategory of Identity Management. Its purpose is to focus on privileged accounts, important accounts used by the team of IT administrators – PowerPoint PPT presentation

Number of Views:10

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Privileged Identity Management protects user accounts via PIM Solutions


1
PRIVILEDGED IDENTITY MANAGEMENT PROTECTS USER
ACCOUNT VIA PIM SOLUTIONS
2
CONTENT
  • What is Privileged Identity Management?
  • How Privileged Identity Management works?
  • Privileged Identity Management Features
  • Privileged Identity Management Benefits

3
  • Sometimes, unscrupulous people steal the log in
    credentials of the employees of an organization
    in order to hack into the servers and steal the
    data. Compromised identities of employees are new
    threats for corporate organizations to counter.
  • Advanced cyber attacks are automated, persistent,
    and in 99 cases successful. Security of IT
    infrastructure cannot be guaranteed solely on the
    basis of firewalls because they can only react to
    previously identified threats. Once the attackers
    penetrate your computer system, they can easily
    explore the whole network and exploit unsecured
    privileged credentials as they wish.
  • Therefore, Identity Management is a solution to
    every threat that can arise due to compromised
    identity. It is defined as an administrative
    area, dealing with identification of individuals
    in a system (an enterprise) and controlling their
    access to resources within that system. Access is
    controlled by associating user rights and
    restrictions with the established identity.

4
What is Priviledged Identity Management ?
  • Privileged Identity Management (PIM) is
    subcategory of Identity Management. Its purpose
    is to focus on privileged accounts, important
    accounts used by the team of IT administrators or
    sometime, people in the top brass of the
    organization. It also focuses on select business
    users and applications that are crucial to the
    business operations of the organization.Privilege
    d accounts are targeted by external attackers
    surpassing firewall and malicious insiders (rogue
    employees) who have access to sensitive data.PIM
    Solutions ensure security for user accounts in
    the applications that are a part of IT
    Infrastructure.

5
How Priviledged Identity Management works ?
  • PIM Solution manages the lifecycle of the
    privileged credentials on any cross-platform
    enterprise through the following process
  • 1. Discovery stagePIM identifies and documents
    all critical IT assets, along with their
    privileged accounts and their interdependencies.2
    . RemediationPIM Solutions enforce rules for
    password complexity, diversity, change frequency,
    and synchronization of changes across all
    dependencies.3. DelegationPIM
    Solutions delegate access to privileged
    credentials in order to ensure that only
    authorized users or appropriate personnel, using
    the least privilege required, can log into IT
    assets.4. TrackingPIM creates Audits and alerts
    all potential threats so that the requester,
    purpose, and duration of each privileged access
    request can be documented and monitored.

6
Priviledged Identity Management Features
  • The security features offered by PIM Solutions
    are as follows
  • Temper-proof storage
  • High availability modules and disaster recovery
    modules
  • Strong authentication support
  • FIPS 140-2 validated cryptography
  • Customizable request workflows
  • Segregation of duties
  • Real-time behavioural analytics

7
Priviledged Identity Management Benefits
  • The benefits offered by PIM Solutions are as
    follows Temper-proof storage
  • Efficient Administrative Interface
  • Better security
  • Record availability
  • Detailed information

8
About LTS SECURE
  • LTS Secure offers a Security Suite to
    rationalize, prioritize automate response to
    risks in your environment. Comprehensive Cyber
    Security Solutions with continuous monitoring at
    all layers of the IT stack network packets,
    flows, OS activities, content, user behaviors and
    application transactions.
  • To know more about LTS SECURE, contact us at
    enquiry_at_leosys.net or call us at 800-689-4506
  • Visit us at http//ltssecure.com
About PowerShow.com