Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Inside Privileged Access Management

Hitachi ID Systems' Shoham on the Business Drivers, Benefits
Inside Privileged Access Management

Wary of intrusions, data compromise and theft, organizations increasingly are deploying privileged access management solutions. Idan Shoham of Hitachi ID Systems offers the essential do's and don'ts.

Breach prevention is one of the key business drivers, says Shoham, CTO and founder of Hitachi ID Systems. But there also is concern to avoid regulatory penalties or negative publicity that could result from the wrong person accessing privileged data.

"At the end of the day, these are all dimensions of security," Shoham says. "People are basically worried about securing their infrastructure and their data."

And fair warning, he adds: The biggest deployment challenges are not technical; they're organizational.

In an interview about privileged access management, Shoham discusses:

  • The business drivers for privileged access management;
  • The essential do's and don'ts;
  • How to prioritize a PAM deployment.

In his role as Chief Technology Officer, Shoham is responsible for defining product and technology strategy and the overall development of Hitachi ID Systems solutions. He works closely with his talented team to ensure that the solutions that Hitachi ID Systems delivers to the market are of the highest quality. Prior to founding Hitachi ID Systems in 1992, Shoham provided network security consulting services to large organizations such as Shell, Amoco, BP Canada and Talisman Energy. He holds a Masters degree in Electrical and Computer Engineering.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.