> White Papers > CA Technologies > Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership
 

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

CA Technologies

Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.

Tags : 


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jun 26, 2017
Length:  10
Type:  White Paper