New IT Security Survey Results -- Top Reasons To Monitor Users
BalaBit IT Security survey about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology
March 7, 2014
1 Min Read
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
PRESS RELEASE
NEW YORK and SAN FRANCISCO, February 25, 2014 – BalaBit IT Security (www.balabit.com) today announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring (PAM) technology.
Of those surveyed, respondents ranked the reasons for monitoring privileged users, from most to least important, as follows:
Read more about:
2014Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
You May Also Like
More Insights
Webinars
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024
Events