Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Path to Privileged Access Management

Hitachi ID Systems' Shoham on the Business Drivers, Benefits
Path to Privileged Access Management
Idan Shoham, Hitachi ID Systems

Wary of intrusions, data compromise and theft, organizations increasingly are deploying privileged access management solutions. Idan Shoham of Hitachi ID Systems offers the essential do's and don'ts.

Breach prevention is one of the key business drivers, says Shoham, CTO and founder of Hitachi ID Systems. But there also is concern to avoid regulatory penalties or negative publicity that could result from the wrong person accessing privileged data.

"At the end of the day, these are all dimensions of security," Shoham says. "People are basically worried about securing their infrastructure and their data."

And fair warning, he adds: The biggest deployment challenges are not technical; they're organizational.

In an interview about privileged access management, Shoham discusses:

  • The business drivers for privileged access management;
  • The essential do's and don'ts;
  • How to prioritize a PAM deployment.

In his role as Chief Technology Officer, Shoham is responsible for defining product and technology strategy and the overall development of Hitachi ID Systems solutions. He works closely with his talented team to ensure that the solutions that Hitachi ID Systems delivers to the market are of the highest quality. Prior to founding Hitachi ID Systems in 1992, Shoham provided network security consulting services to large organizations such as Shell, Amoco, BP Canada and Talisman Energy. He holds a Masters degree in Electrical and Computer Engineering.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.