- “Prevention of both breaches and insider attacks remains the major driver for the adoption of privileged access management (PAM) solutions, followed by regulatory compliance and operational efficiency.”
- “Federal agencies that are required to use multifactor personal identity verification (PIV)-based authentication for privileged users as part of HSPD-12 and Cybersecurity Strategy and Implementation Plan (CSIP) directives19 should look out for vendors that offer native support for Common Access Card (CAC) and PIV smartcards. CA Technologies (Privileged Access Manager, formerly Xceedium Xsuite) and BeyondTrust offer broad support for PIV-based authentication.”
- “Vulnerability management: Some vendors such as BeyondTrust are leveraging synergies between privileged command delegation and vulnerability management to detect and prevent unsafe operations on potentially compromised or vulnerable systems. Vulnerability assessments can also be correlated with privileged activity for risk scoring.”
Scott Lang, Sr. Director, Product Marketing at BeyondTrust
Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.