MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

News
Smb pam in smbs recommendations devolutions blog

Privileged Access Management in SMBs + Recommendations

We asked executives and decision-makers in SMBs to share how they are approaching, handling, and experiencing privileged access management (PAM) in their companies...

Photo of Laurence Cadieux Laurence Cadieux

Key Findings from the Survey

Problems Using a Federated System

To protect the valuable data and assets in their privileged accounts — a.k.a. “the keys to the kingdom” — SMBs need to establish and enforce both parts of the Identity and Access Management equation:

However, a common challenge is that certain technologies — such as legacy systems, phones, and cameras — cannot use a federated system.

So why don’t SMBs solve this by manually creating and maintaining unique identity accounts for each user? While this is technically possible, in reality it is highly impractical considering the volume of different privileged account types that typically exist in the ecosystem, such as:

Fortunately, there is a proven solution to this challenge: SMBs should fully implement a PAM solution that bridges the gap between authentication and authorization, and extends the protection offered by an IAM system into the non-federated identity space.

What SMBs Should Look for in a Robust PAM Solution

SMBs should focus on a robust PAM solution that offers all of the following:

In addition to the above, some more sophisticated PAM solutions support privileged session management (PSM), which utilizes a specialized server that brokers authentication behind-the-scenes, and can also record the activity of remote sessions. PSM is especially important for SMBs that have contractors and “boomerang” employees (i.e., employees who leave the organization and then return). These end users typically need more scrutiny and limited access.

Benefits of Fully Implementing a PAM Solution

By fully implementing a robust PAM solution, SMBs will effectively and sustainably:

Looking Ahead

In our next deep dive into the Devolutions State of IT Security in SMBs in 2022-23 Survey report, we will look at how SMBs are prioritizing, implementing, and measuring efforts to improve IT security awareness, and how they can improve this area to strengthen the “weakest link” in the IT security defense chain: end users.

More from News

Read more articles