Browse Definitions :
Definition

CA Privileged Access Manager

CA Privileged Access Manager is a product that tracks and secures the usage of logins involving access to administrative control or sensitive information.  Privileged Access Manager is available as a rack-mounted hardware appliance or a virtual appliance.

By tracking privileged logins, Privileged Access Manager helps detect and prevent one of the most common and hardest to track source of breaches: stolen credentials. The product uses real-time monitoring, behavioral analytics, session recoding and real-time alerts to ensure that credentials are being used by the authorized user and that they are used as they should be according to company policy. Privileged Access Manager works in physical, virtualized and cloud environments and offers fast, easy deployment.

Along with the behavioral analytics comes risk assessment, based on previous behaviors and changes in behavior. Automated, enforced re-authentication and account restrictions help secure organizatiobns from breaches resulting from both external and insider threats, whether those threats are malicious or due to carelessness. Passwords stored in scripts can be detected and restricted, eliminating a credential theft point.

As the use of privileged credentials is one of the main sources of breaches, systems that help detect breaches at the earliest point -- or even prior to an actual data breach -- can save companies time and money and protect their sensitive data, reputations, trade secrets and intellectual property.

See an introductory presentation on CA Privileged Access Manager:

This was last updated in December 2016

Continue Reading About CA Privileged Access Manager

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close