BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology

March 7, 2014

1 Min Read

PRESS RELEASE

NEW YORK and SAN FRANCISCO, February 25, 2014 – BalaBit IT Security (www.balabit.com) today announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology.

Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:

Read more about:

2014
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights