Because a compromised privileged account appears to be a legitimate user, it’s very difficult to find the root cause or perform digital forensics when the breach is eventually detected.
This book gives IT professionals a practical understanding of privileged account management (PAM). It describes what privileged accounts are, where they reside throughout an IT environment, and how they function. Most important, this book explains the risks associated with these accounts and how to best protect them from hacker and malicious insider threats.
This book has been written for IT administrators, systems administrators, and security professionals responsible for protecting their organizations from security threats. It assumes a basic level of IT expertise and experience in managing IT networks and exposure to the use of privileged accounts and passwords as part of daily tasks.
Get the Privileged Account Management for Dummies eBook here.