{"id":28174,"date":"2021-02-25T14:40:28","date_gmt":"2021-02-25T06:40:28","guid":{"rendered":"https:\/\/version-2.com\/?p=28174"},"modified":"2021-06-16T15:41:28","modified_gmt":"2021-06-16T07:41:28","slug":"what-are-the-main-features-of-a-pam-solution","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/","title":{"rendered":"What are the main features of a PAM solution?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"28174\" class=\"elementor elementor-28174\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\" alt=\" width=\"984\" height=\"auto\"><\/p>\n\n<p>\nPrivileged Access Management (PAM) is formed by a set of\u00a0cybersecurity\u00a0strategies and technologies to exercise control over privileged access and permissions for users, accounts, processes, and systems in a technological environment.\n<\/p><p>\nA PAM is an ideal solution for preventing and mitigating damage resulting from external attacks, as well as from the neglect of internal employees and other insider threats against privileged credentials, specifically.\n<\/p><p>\nAlthough PAM encompasses many strategies, the main goal of the solution is to apply the concept of\u00a0least privilege, which concerns the restriction of access rights and permissions for users, accounts, applications, systems, devices, and computing processes to the absolute minimum access required for them to perform their daily activities.\n<\/p><p>\nFor this reason, PAM is considered by many experts and technologists to be one of the most important cybersecurity solutions for reducing cyber risks and obtaining a relevant security return on investment (ROI).\n<\/p><p>\nIn today\u2019s article, we explore the main features of a PAM solution and clarify some of the goals of this technology. Keep reading it and find out more about the PAM features.<\/p>\n<h2 style=\"color:#026566;\">PAM x IAM<\/h2>\n<p>\nPAM is generally related within a broader scope of Identity and Access Management (IAM).\n<\/p><p>\nHowever, IAM controls provide identity authentication to ensure that a legitimate user has the correct access. Meanwhile, PAM offers visibility, management, and\u00a0auditing\u00a0in a detailed way about privileged identities and activities.\n<\/p><p>\nTogether, PAM and IAM provide refined control, visibility, and auditing capabilities over all existing credentials and privileges in a systemic environment.\n<\/p><p>\nHere, we also talk about the main features of a PAM solution and its benefits. If you want to learn more about IAM and how this solution complements PAM, read our article entitled \u201c<u>xxxxx<\/u>\u201d.<\/p>\n<h2 style=\"color:#026566;\">Features of a PAM solution<\/h2><p>\nPrivileged access or privileged account is a term used to designate access or special skills above and beyond that of a default user. Privileged access allows organizations to protect their infrastructure and applications, manage businesses efficiently, and maintain the confidentiality of sensitive data and critical infrastructure.<\/p><p>\n\nPrivileged access\u00a0can be associated with human users, as well as non-human users, such as applications and machine identities.\n<\/p><p>\nThus, PAM is a solution for managing these privileged accesses. Its main goal is protecting and controlling the use of impersonal and high-privilege credentials, providing secure storage, segregation of access, and full use traceability.\n<\/p><p>\nTo perform this management of credentials, the PAM solution uses the configuration of\u00a0Access Groups\u00a0to define the administrator users who will be allowed to use the password for physical access, and the group of users who can use the remote access offered by the solution to access a target device or system.\n<\/p><p>\nAll cases may respect approval workflows and validation of explanations provided by the requesting user.\n<\/p><p>\nIn addition to these basic functions, we present below other possibilities for PAM solutions.<\/p>\n<ul>\n \t<li>Emergency Accounts: Provide users with administrator access to secure systems in case of an emergency. Access to these accounts requires the approval of the system manager for security reasons. This is usually a manual process that requires security measures.<\/li>\n \t<li>Local administrative account management: shared accounts that provide administrator access to the localhost or a session only. These local accounts are routinely used by IT staff for maintenance on workstations and servers, network devices, and other internal systems.<\/li>\n \t<li>Application Account Management: These accounts are used by\u00a0applications\u00a0to access databases, perform tasks, run scripts, or provide access to other applications. These privileged accounts often have access to sensitive confidential information within applications and databases.<\/li>\n \t<li>Active Directory Integration: A challenge to protect, to say the least, passwords can be even more challenging if changes need to be made, as they require synchronization between various systems and applications.<\/li>\n \t<li>Service Account Management: Local or domain accounts used by an application or service to interact with the operating system. In some cases, these service accounts have administrative privileges on domains, depending on the requirements of the application for which they are used.<\/li>\n \t<li>Domain Administrative Account Management: super administrators who have privileged access to all workstations and servers within the organization\u2019s domain and provide the widest access over the network. Because they have access to administrative accounts, they are a constant target for hackers.<\/li>\n \t<li>Privileged User Account Management: These are users who receive administrative privileges for the systems. Privileged user accounts are one of the most common forms of account access granted in a corporate domain, allowing users to have administrator rights, for example, on their local desktops or on the systems they manage. These accounts often have unique and complex passwords, but most of the time, they are only protected by the passwords.<\/li>\n<\/ul>\n<p>\nThe more privileges and access a user, account, or process accumulates, the greater the potential for abuse, exploitation, or error. The implementation of privilege management not only minimizes the potential for a\u00a0security\u00a0breach to occur, but also helps to limit the scope of one if it occurs.<\/p>\n<h2 style=\"color:#026566;\">Benefits of a PAM solution<\/h2><p>\nA counterpoint between PAM and other types of security technologies is that PAM covers various links in the cyberattack chain, protecting against external attacks and insider threats.\n<\/p><p>\nPAM provides several key benefits, including:<\/p>\n<ul>\n \t<li>Reduced Infection and Malware Spread: Many varieties of\u00a0malware\u00a0need elevated privileges for installation or execution. Removing excessive privileges, such as applying company-wide least privilege principles, can prevent malware from establishing itself or reducing its spread if it occurs.<\/li>\n \t<li>Operational Performance: restricting privileges to the minimum range of processes to perform an authorized activity reduces the chance of incompatibility problems between applications or systems, in addition to helping reduce the risk of downtime.<\/li>\n \t<li>Compliance: By restricting the privileged activities that can be performed, PAM helps to create a less complex and therefore more friendly environment for audits.<\/li>\n<\/ul><p>\nAlso, many compliance regulations (including\u00a0HIPAA,\u00a0PCI DSS, FDDC, Government Connect, FISMA, and\u00a0SOX) and data protection laws (such as GDPR, LGPD, and CCPA) require organizations to apply least privilege access policies to ensure adequate data management and system security.\n<\/p><p>\nWhen used to manage privileged access on organizational systems and platforms that store or protect the integrity of sensitive data, senhasegura provides a centralized access point for critical systems. Its features allow strengthening the access control, limiting the user access only to what was previously authorized, respecting the principle of least privilege.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,461,61],"tags":[420,462],"class_list":["post-28174","post","type-post","status-publish","format-standard","hentry","category-segura","category-year2021","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the main features of a PAM solution? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the main features of a PAM solution? - Version 2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-25T06:40:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T07:41:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"What are the main features of a PAM solution?\",\"datePublished\":\"2021-02-25T06:40:28+00:00\",\"dateModified\":\"2021-06-16T07:41:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/\"},\"wordCount\":9,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i1.wp.com\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"Segura\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/\",\"name\":\"What are the main features of a PAM solution? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i1.wp.com\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\",\"datePublished\":\"2021-02-25T06:40:28+00:00\",\"dateModified\":\"2021-06-16T07:41:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/senhasegura.com\\\/assets\\\/uploads\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/02\\\/what-are-the-main-features-of-a-pam-solution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the main features of a PAM solution?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the main features of a PAM solution? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/","og_locale":"en_US","og_type":"article","og_title":"What are the main features of a PAM solution? - Version 2","og_url":"https:\/\/version-2.com\/en\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/","og_site_name":"Version 2","article_published_time":"2021-02-25T06:40:28+00:00","article_modified_time":"2021-06-16T07:41:28+00:00","og_image":[{"url":"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"What are the main features of a PAM solution?","datePublished":"2021-02-25T06:40:28+00:00","dateModified":"2021-06-16T07:41:28+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/"},"wordCount":9,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1","keywords":["Segura","2021"],"articleSection":["Segura","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/","url":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/","name":"What are the main features of a PAM solution? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1","datePublished":"2021-02-25T06:40:28+00:00","dateModified":"2021-06-16T07:41:28+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#primaryimage","url":"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1","contentUrl":"https:\/\/i1.wp.com\/senhasegura.com\/assets\/uploads\/2021\/02\/what-are-the-main-features-of-a-pam-solution-01-01.png?ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/02\/what-are-the-main-features-of-a-pam-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What are the main features of a PAM solution?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-7kq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/28174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=28174"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/28174\/revisions"}],"predecessor-version":[{"id":33077,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/28174\/revisions\/33077"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=28174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=28174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=28174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}