Endpoint Security , Identity & Access Management , Internet of Things Security

Top Drivers for Privileged Account Management

Grant Burst of Wallix Says Operational Technology Driving More PAM Rollouts
Grant Burst, cybersecurity engineer, Wallix

When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities.

See Also: Webinar | Fortify, Comply and Simplify Sensitive Data Security and Privacy Using a File Centric, Protect First Approach

But another dominant trend has been the range of sectors that are embracing PAM in large part because of the increasingly vast number of devices they must manage.

"When we're looking at the OT [operational technology] sector, when we're looking at power, water, manufacturing, these are all solutions that we never even thought about before needing this," Burst says. "But with the internet of things coming on, with everything being interconnected, we're seeing more and more wanting the control" that PAM provides.

In a video interview at the recent Infosecurity Europe conference, Burst discusses:

  • Key business challenges being faced by his customers;
  • Best practices for outsourcing PAM projects;
  • The importance of securing critical assets.

Burst is a cybersecurity engineer at Wallix, a European specialist in privileged account governance.

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.