Skip to content

9 Essential Features or Good Practices for a Privileged Access Management Solution (PAM)

It is undeniable that the use of a privileged access management solution (PAM) considerably improves a company’s information security. But what many do not know is that there are some essential features or recommendations for a PAM solution to guarantee information security efficiently.

Today, we list the 09 essential features or good practices that a privileged access management solution must have to ensure its success as a PAM.

Learn more: Quick Guide – PAM Best Practices

1 – Privileged Session Recording

It is essential that your privileged access management solution has the privileged session recording feature to record, in video and text, the actions performed by the user within the system while using a privileged credential.

This is one of the main tools to check if users are performing actions relevant to their tasks, ensuring the confidentiality of the company’s sensitive data and that all actions are tracked and audited.

For a good privileged session recording, check with the PAM solution provider if the tool allows the storage of session record files and audit logs to prevent users from editing their activity histories and damaging your entire monitoring system.

2 – Review of Privileged Credentials 

In order to ensure good information security, one needs to perform recurrent preventive practices, such as managing their company’s privileged accounts.

A solution that does not have this feature – or has a flawed one – leaves many security holes, allowing a possible cyberattack.

With this features, it is possible to gather all active privileged credentials and check the privilege level of each one, reviewing whether it makes sense for users to have access to such environments, in addition to removing credentials that are no longer used, such as those of employees who were dismissed from the company.

3 – Credential Management

In order to mitigate the risks of data leaks, in addition to reviewing access to privileged credentials, it is necessary to manage them through an automatic password change feature, be it by predetermined use, period, or time.

This prevents users from sharing passwords or improperly accessing anything outside the solution.

Learn More: Machine Identity and Digital Certificate Management

4 – Two-Factor Authentication

The main solutions on the market require two-factor authentication from the user, usually through an OTP (One-Time Password). It is also possible to send an SMS or an email with a confirmation code for someone to be able to use the privileged credential.

This type of feature makes it difficult for unauthorized people to use the privileged user’s credential.

5 – Backup

One of the most important parts of a PAM solution is to have the feature of automatic backups. Even with all the security locks, the backup appears as one of the last information security features.

This ensures that even with leaked and/or deleted data, the company is able to have access to all data protected by the privileged access management solution.

6 – Strong Passwords

This practice is very simple and essential. Through a company, it is possible to implement a PAM password vault and make privileged credentials available to users. However, there must be some kind of guarantee that all privileged credentials have strong passwords that are difficult to be broken with the use of malicious software.

The ideal is to guide the user to create a password that mixes upper and lower case letters, numbers, and special characters, with at least 8 characters.

Learn more: Best Practices Manual for PAM

7 – Emergency Access 

In the event of any abuse of privilege in your company, it is important to have a last-security feature through the break-the-glass functionality in case any type of system unavailability occurs, be it a product or an infrastructure failure, even a cyberattack. The person responsible for information security has the autonomy to take their privileged credential through a segregated backup file.

This type of feature prevents technological lock-in, and there is no way for the user to resort to the occurrence.

8 – Notification of Suspicious Actions

Whenever there is a suspicious action within a privileged session, in addition to having several security locks, your PAM solution must notify those responsible for information security to take appropriate measures.

9 – Access Reporting

Finally, access reporting is important so that the responsible person has a complete view of the actions performed through privileged sessions, allowing the identification of security breaches and points for improvement. A complete set of reports optimizes time and work, as there is no need to conduct audits from session to session.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

訊連科技FaceMe® AI臉部辨識引擎攜手晶睿通訊 打造整合AI臉部辨識的智慧安防解決方案

【2020年9月30日,台北訊】 全球頂尖AI臉部辨識領導廠商訊連科技 (5203.TW)與數位監控解決方案領導廠商晶睿通訊 (VIVOTEK) 攜手合作,將訊連科技AI臉部辨識加值軟體FaceMe® Security整合至晶睿通訊影像管理軟體VAST 2,打造整合AI臉部辨識技術的智慧安防解決方案。此一站式的服務不僅讓使用者可輕鬆管理大量安防攝影機,更可透過AI臉部辨識技術,進行員工、VIP及黑名單等身分辨識,及整合即時通知示警,打造更智慧、高效的安防解決方案,並可運用於各式各樣的物聯網應用領域中。

訊連科技FaceMe® AI臉部辨識引擎攜手晶睿通訊 打造整合AI臉部辨識的智慧安防解決方案

近年來,AI臉部辨識應用蓬勃發展,其中智慧安防更是主流應用之一,AI臉部辨識可為智慧安防提供更多樣化的應用。藉由此策略合作,訊連科技的FaceMe® Security解決方案可與晶睿通訊影像管理軟體VAST 2高度整合,結合晶睿通訊多元齊全的網路攝影機產品線和後端影像管理軟體,大幅簡化以往繁雜的安裝流程。此外,用戶端亦可根據名單管理功能(員工、VIP及黑名單),於安控場景準確辨認VIP或可疑人士,同步搭配精準的即時通知、快速比對VAST 2系統資料庫篩選出對應影像,為使用人員帶來更安全、即時的安控系統,提供頂尖的臉部辨識安防應用情境,打造全新的AI臉部辨識安防體驗。

訊連科技與晶睿通訊透過策略聯盟,將台灣開發的AI臉部辨識整合解決方案推向國際市場,可應用於智慧安控、智慧建築及智慧製造等眾多領域應用案例中。訊連科技與晶睿通訊將於10月15日共同舉辦 「智慧安防 x 臉部辨識 – AI 智慧物聯新視界」線上研討會,分享AI臉部辨識安控解決方案相關應用,讓台灣客戶可有更深入的了解。

「智慧安防 x 臉部辨識 – AI 智慧物聯新視界」線上研討會

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

關於晶睿通訊
晶睿通訊股份有限公司(股票代號:3454)於2000年在台灣成立。本公司於全球各地銷售晶睿通訊監控系統解決方案,現已成為全球數位監控產業的領導品牌。提供網路攝影機、影音伺服器、網路錄影機(NVRs)、PoE解決方案與中央管理軟體(CMS)等,提供全方位的產品解決方案。隨著物聯網日益興盛,晶睿通訊期許能憑藉在影音方面廣泛的技術能力,成為物聯網的眼睛。本公司已分別於美國-加州 (2008)、歐洲-荷蘭 (2013)、印度-德里 (2014)、中東-杜拜 (2015)、拉丁美洲-墨西哥 (2016) 和日本-東京 (2017) 設立辦事處和子公司。為了創建良好的產業生態系統,晶睿通訊偕同國際領先的軟體和硬體廠商拓展策略聯盟,與遍及116個國家、超過183個授權經銷商夥伴共同合作。欲了解更多訊息,請瀏覽官方網站www.vivotek.com

×

Hello!

Click one of our contacts below to chat on WhatsApp

×