> CA Technologies > Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership
 

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

White Paper Published By: CA Technologies
CA Technologies
Published:  Aug 22, 2017
Type:  White Paper
Length:  10 pages

Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.



Tags : 


Featured FREE Resource: