Access Management , Privileged Access Management , Security Operations
Using PAM in an OT EnvironmentGartner's Felix Gaehtgens on Addressing Challenges
To enhance privileged access management for operational technology, organizations should use specialized remote access solutions for vendors that are allowed to access OT networks, says Felix Gaehtgens, an analyst at Gartner
"One of the primary tasks is to separate the authentication of the person that needs to log in from the actual authentication of the device," he says.
See Also: Live Webinar | Breaking Down Security Challenges so Your Day Doesn’t Start at 3pm
In a video interview with Information Security Media Group, Gaehtgens also discusses:
- The challenges of setting up PAM for an OT environment;
- Tips on launching PAM for OT;
- Addressing PAM implementation challenges.
Gaehtgens is a vice president, analyst at Gartner who focuses on identity and access management. Previously, he was a technology adviser to large corporations and public institutions in Europe, the U.S. and Latin America. He was also involved in high-tech ventures, most recently as a co-founder of Symlabs, a virtual directory vendor, where he served as an interim CEO, product manager and architect.