Events , Privileged Access Management , RSA Conference

SMBs Now See Privileged Access Management Working for Them

Maurice Côté of Devolutions on Bridging the Gap Between Enterprises and SMBs
Maurice Côté, vice president, products, Devolutions

Cybersecurity companies initially designed privileged access management as a concept with large enterprise customers in mind, but the technology is beginning to work for smaller businesses, said Maurice Côté, vice president, products, Devolutions.

See Also: Cloud Security and Developers: Role of Zero Standing Privilege

Privileged access management was built for large enterprises, insurance companies and financial institutions, but it changed over the years into something that smaller businesses are now moving toward, Côté said.

The technology offers features and capabilities, including behavioral analytics and machine learning, but smaller businesses require easy deployment, robustness and affordability, he said.

PAM was heavily defined for large businesses, necessitating a security team, a compliance team and auditors. "You need that whole overhead of managing the PAM. We're democratizing PAM, creating PAM for those that cannot afford such a heavy infrastructure," Côté said.

In this video interview with Information Security Media Group at RSA Conference 2024, Côté also discussed:

  • The top challenges SMBs face when deploying PAM;
  • Helping small business owners set up PAM for their networks;
  • How to make PAM affordable for smaller companies.

Côté has rich experience in the computer software industry. At Devolutions, he heads the privileged access management product developed particularly for SMBs.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.