The ROI of Privileged ID Governance

Merritt Maxim of CA Technologies on the Business Benefits
The ROI of Privileged ID Governance

Organizations are careful when granting privileged access to critical systems. But they struggle to govern these privileged identities. Merritt Maxim of CA Technologies shares new strategies.

See Also: How Supply Chain Attacks Work — and How to Secure Against Them

By taking extra care in privileged identity governance, organizations can improve their entire security posture, says Maxim, director of identity management product marketing at CA Technologies.

A fundamental challenge for many organizations: just knowing who their privileged users are. "In any large, distributed organization, you've got lots of employees," Maxim says. "They are changing roles and responsibilities. They may get added on to certain projects for certain business initiatives. Even just understanding at any given moment in time who your privileged users are - just the discovery of those [users] is a very important step and one that can be challenge."

In an interview about privileged identity governance, Maxim discusses:

  • Why privileged identities are often managed badly;
  • How leading organizations are addressing privileged identity governance;
  • Business benefits of improving identity management.

Maxim has 15 years of product management and product marketing experience in the information security industry, including stints at RSA Security, Netegrity and CA Technologies. In his current role at CA Technologies, Merritt handles product marketing for CA's identity management and cloud security initiatives. The co-author of "Wireless Security" Merritt blogs on a variety of IT security topics, and can be followed at

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.