MAIN MENU
Solutions

Paquets d'installation

blue box
Starter pack

Toute la puissance de Devolutions à moitié prix pour les équipes de 5

Preuve de concept : 100+ utilisateurs?

Vue d'ensemble rapide

Conformité

Votre partenaire de confiance en matière de sécurité et de conformité.

Intégrations

Unifiez vos solutions avec les intégrations qu'offre Devolutions

Le blogue Devolutions

Annonces, mises à jour et analyses de Devolutions

This content is not yet available in Français. You are viewing the English version.

Nouvelles
Smb pam in smbs recommendations devolutions blog

Privileged Access Management in SMBs + Recommendations

We asked executives and decision-makers in SMBs to share how they are approaching, handling, and experiencing privileged access management (PAM) in their companies...

Photo of Laurence Cadieux Laurence Cadieux

Key Findings from the Survey

Problems Using a Federated System

To protect the valuable data and assets in their privileged accounts — a.k.a. “the keys to the kingdom” — SMBs need to establish and enforce both parts of the Identity and Access Management equation:

However, a common challenge is that certain technologies — such as legacy systems, phones, and cameras — cannot use a federated system.

So why don’t SMBs solve this by manually creating and maintaining unique identity accounts for each user? While this is technically possible, in reality it is highly impractical considering the volume of different privileged account types that typically exist in the ecosystem, such as:

Fortunately, there is a proven solution to this challenge: SMBs should fully implement a PAM solution that bridges the gap between authentication and authorization, and extends the protection offered by an IAM system into the non-federated identity space.

What SMBs Should Look for in a Robust PAM Solution

SMBs should focus on a robust PAM solution that offers all of the following:

In addition to the above, some more sophisticated PAM solutions support privileged session management (PSM), which utilizes a specialized server that brokers authentication behind-the-scenes, and can also record the activity of remote sessions. PSM is especially important for SMBs that have contractors and “boomerang” employees (i.e., employees who leave the organization and then return). These end users typically need more scrutiny and limited access.

Benefits of Fully Implementing a PAM Solution

By fully implementing a robust PAM solution, SMBs will effectively and sustainably:

Looking Ahead

In our next deep dive into the Devolutions State of IT Security in SMBs in 2022-23 Survey report, we will look at how SMBs are prioritizing, implementing, and measuring efforts to improve IT security awareness, and how they can improve this area to strengthen the “weakest link” in the IT security defense chain: end users.

More from Nouvelles

Read more articles