Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Consulting

Hall 7 / Booth Number 7-234

Privileged User Management (PUM)

Key Facts

  • Authorization concepts especially for privileged users
  • Requirements analysis and engineering for PxM solutions
  • Implementation, review and optimization of PxM solutions

Product Description

Personnel with special responsibilities and functions often require special access and usage rights in IT systems and applications. Privileged User Management controls the special rights of these "privileged users" and protects organizations against deliberate but also unwitting abuse of privileges. Administrative accounts (such as domain admin, root, or super-user) are a popular target for cyber attacks and therefore exposed to special risks. In order to protect these, various approaches are pursued: While Privileged User Management (PUM) focuses on managing user accounts with extended privileges, Privileged Access Management (PAM) focuses on managing and controlling critical access. Because of these and other existing variations, the abbreviation PxM is increasingly used to summarize all such solutions in conjunction with other security systems. Due to the complex authorization structures and the criticality of the systems and processes affected by potential damage, as well as the need for still smooth access by privileged users, a coherent PxM places even greater demands on design experience, process know-how, and architectural knowledge than traditional identity management. The security specialists at CONET help you in keeping track of roles and authorizations and to reliably and completely secure your systems and data. We offer you: • Authorization concepts especially for privileged users • Requirements analysis and engineering for PxM solutions • Implementation, review and optimization of PxM solutions • Real-time quick-check of roles and permissions
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.