Developments in Privileged Access Management

Logo
Presented by

Yeghisabet Alaverdyan, Head of Systems Integration | EKENG CJSC

About this talk

Privileged access management (PAM) is evolving to meet the challenges of modern centralized, decentralized, distributed networks, and endpoints. Cutting-edge solutions now incorporate AI-driven anomaly detection to monitor and flag unusual privileged account behavior, coupled with just-in-time (JIT) privilege escalation for temporary, task-specific access. Unified dashboards enhance visibility and streamline management across hybrid IT environments. In decentralized networks, blockchain technology ensures tamper-proof identity management, while decentralized authentication leverages cryptographic keys to reduce reliance on central directories. Federated access models facilitate secure privilege sharing across domains without exposing sensitive credentials. For distributed networks, Zero Trust Architecture (ZTA) enforces continuous verification of users and devices, while edge computing integration secures privileged access directly at network endpoints. Dynamic policy enforcement adapts in real time, responding to contextual factors like user location or device status. On endpoints, Endpoint Privilege Management (EPM) minimizes attack surfaces by granting least-privilege access. Device-centric identity management ties privileges to specific devices, and behavioral analytics monitor endpoint activities for unauthorized privilege use. These advancements collectively enable robust, scalable, and context-aware PAM strategies across diverse network architectures. Discover how rigorous inspection, computing science, algebra, and technology combine to combat unauthorized access, protect company assets, and build user trust.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (627)
Subscribers (210282)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.