On-Demand Webinar

Determining the Best Approach to PAM for You

UNIX, Linux, AIX
October 23, 2018


Privileged Access Management (PAM) tools for IT and network infrastructure have been available for more than thirty years.  As these tools have evolved, two methodologies have emerged, both with the goal of regulating and protecting privileged accounts. 
This webinar with David Dingwall, Senior Cybersecurity Strategist at HelpSystems, will explore the two main approaches to PAM. First, Privileged Account and Session Management (PASM), which is chiefly a password-based gateway solution between the operator and the system(s) they administer. The second approach is Privilege Escalation and Delegation Management (PEDM), which is primarily an end-point solution installed on servers and network devices.

Ideal for IT Operations, DevOps, or IT security/audit staff, you’ll leave this webinar with key takeaways on:

  • Mapping to common regulatory environments
  • Difficultly level in subverting these two solutions
  • Multi Factor Authentication integration
  • The death of passwords as an authentication mechanism by 2020

David Dingwall provides an overview of how PASM and PEDM solutions work individually, the environments they are best suited to, and how both solutions are ultimately complementary.   

Want to learn more about PEDM software?

Learn more about PASM and PEDM to determine which solution is right for you.