Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Privileged Account Management (PAM)
Jens Albrecht
B.Sc. Electrical Engineering
Presales Cyber Security
jens.albrecht@ingrammicro.com
Brunnmatt 14
CH-6330 Cham
Privileged access perfectly protected
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 2
• Human (Domain Administrator, CxO, Web Portals…)
• Non-human (Service Account, SU, root, Web Master, Router)
• They access, control and manage IT environments / services
• Are targets for IT attacks to get system access to compromise
CIA (Confidentiality, Integrity, Availability)
What are Privileged Accounts?
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 3
• Use very long and complex passwords
• Change passwords periodically
• Share passwords only on a secure way (better don’t share)
• Monitor and audit the Account usage
 This is difficult to implement 
How to protect Privileged Accounts?
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 4
• Define password policies for privileged accounts
• Automatically changes passwords for privileged accounts
• Doesn’t allow privileged accounts to be directly shared
• Monitors and records sessions for privileged account activity
 Can be done very easily with a PAM system 
How Privileged Account Management helps you?
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 5
• The Windows password expires after a period or a date
• A new Windows password will be automatically generated
• E.g. the jump account for Windows RDP sessions
Example 1: Automatically change passwords
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 6
• The PAM system provides an RDP launcher for autologin
• The Windows password isn’t visible for the operator
• E.g. to access Domain Controllers
Example 2: Use PAM for autologin for RDP
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 7
• The PAM systems starts the Web Password Filler for autologin
• The password will not be shown to the operator
• E.g. access to any web portals
Example 3: Use PAM for autologin to web portals
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 8
• The PAM systems provides session recording
• RDP, Web, PuTTY
• Video on DB or disk
Example 4: Use PAM for Auditing / Compliance
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 9
• We’ve chosen Secret Server from world leader
www.thycotic.com
Our PAM solution for you
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 10
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Fully-featured PAM
solution available
both on-premises
and in the cloud
Secret Server
Establish
Vault
Discover
Unknown Accounts
Manage
Secrets
Delegate
Access
Control
Sessions
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 11
• With Thycotic, your start into PAM is made easily
Our PAM solution for you
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
1405002 rev 6.27.14
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 12
• Get in touch with us and get your free Thycotic consultancy 
• Start a trial / PoC / Rapid Prototyp in your lab / production
• Discover Privileged Accounts in your environment and manage
them with the PAM system. Start with Windows Accounts.
• Your contact for PAM: jens.albrecht@ingrammicro.com
Your next steps for PAM
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Realize the Promise of Technology

More Related Content

PPS
Network Vulnerability Assessments: Lessons Learned
PDF
Content Aware SIEM™ defined
PPTX
The Role of Government in Identity Management
PDF
Cis controls v8_guide (1)
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PDF
Tips to Remediate your Vulnerability Management Program
PPTX
Lets talk about soc2s, baby! BSidesLV 2021
Network Vulnerability Assessments: Lessons Learned
Content Aware SIEM™ defined
The Role of Government in Identity Management
Cis controls v8_guide (1)
PCI DSS Implementation: A Five Step Guide
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Tips to Remediate your Vulnerability Management Program
Lets talk about soc2s, baby! BSidesLV 2021

What's hot (20)

PDF
Solvit identity is the new perimeter
PPTX
Threat Modeling - Writing Secure Code
PDF
EPV_PCI DSS White Paper (3) Cyber Ark
PPTX
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
PDF
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PDF
Database Security, Better Audits, Lower Costs
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PDF
Privileged identity management
 
PDF
8-step Guide to Administering Windows without Domain Admin Privileges
PPTX
Teknisen tietoturvan minimivaatimukset
PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
PDF
Securing DevOps through Privileged Access Management
PDF
AL_PCI-Cheatsheet_web
PPTX
CyberArk
PPTX
QRadar, ArcSight and Splunk
PDF
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PDF
Whitepaper IBM Guardium Data Activity Monitor
PDF
IBM Qradar-Advisor
Solvit identity is the new perimeter
Threat Modeling - Writing Secure Code
EPV_PCI DSS White Paper (3) Cyber Ark
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Database Security, Better Audits, Lower Costs
Managing Multiple Assessments Using Zero Trust Principles
Privileged identity management
 
8-step Guide to Administering Windows without Domain Admin Privileges
Teknisen tietoturvan minimivaatimukset
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Securing DevOps through Privileged Access Management
AL_PCI-Cheatsheet_web
CyberArk
QRadar, ArcSight and Splunk
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Whitepaper IBM Guardium Data Activity Monitor
IBM Qradar-Advisor
Ad

Similar to Privileged Account Management - Keep your logins safe (20)

PPTX
PIM And PAM Security Understanding the Difference.pptx
PPTX
Privileged Access Management (PAM)
PPTX
The Role of PAM in Information Technology and Programming (ITP)
PDF
Why PAM Security Services Are Essential for Modern Cybersecurity.pdf
PPTX
Privileged Access Management (PAM) Chatbot: Enhancing Cybersecurity with AI
PPTX
ISACA-presentation-Aug-18-2016- Onion ID
PPTX
Dell Quest TPAM Privileged Access Control
PPTX
Enhancing Server Security with Privileged Access Management (PAM) for Machine...
PPTX
Privileged Access Management - 2016
PDF
Privileged Access Management
PPTX
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
PPTX
PAM Demos: Enhancing Cybersecurity Through Effective Access Control
PPTX
Enhancing Server Security with Privileged Access Management (PAM) for Machine...
PPTX
Platform Privileged Access Management: Securing High-Access Accounts Across I...
PDF
Establishing a Zero Trust Framework Why Privileged Access Management Matters.pdf
PPTX
Understanding Privileged Access Management (PAM)
PPTX
Privileged Access Management Security Solutions: Protecting Privileged Accounts
PDF
Privleged Access Management
PDF
5 Reasons to Always Keep an Eye on Privileged Business Accounts
PPTX
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
PIM And PAM Security Understanding the Difference.pptx
Privileged Access Management (PAM)
The Role of PAM in Information Technology and Programming (ITP)
Why PAM Security Services Are Essential for Modern Cybersecurity.pdf
Privileged Access Management (PAM) Chatbot: Enhancing Cybersecurity with AI
ISACA-presentation-Aug-18-2016- Onion ID
Dell Quest TPAM Privileged Access Control
Enhancing Server Security with Privileged Access Management (PAM) for Machine...
Privileged Access Management - 2016
Privileged Access Management
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
PAM Demos: Enhancing Cybersecurity Through Effective Access Control
Enhancing Server Security with Privileged Access Management (PAM) for Machine...
Platform Privileged Access Management: Securing High-Access Accounts Across I...
Establishing a Zero Trust Framework Why Privileged Access Management Matters.pdf
Understanding Privileged Access Management (PAM)
Privileged Access Management Security Solutions: Protecting Privileged Accounts
Privleged Access Management
5 Reasons to Always Keep an Eye on Privileged Business Accounts
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Ad

Recently uploaded (20)

PPTX
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
Workplace Software and Skills - OpenStax
PPTX
ROI from Efficient Content & Campaign Management in the Digital Media Industry
PPTX
Human Computer Interaction lecture Chapter 2.pptx
PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PDF
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
PDF
CapCut PRO for PC Crack New Download (Fully Activated 2025)
PPTX
ROI Analysis for Newspaper Industry with Odoo ERP
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
PDF
Lumion Pro Crack New latest version Download 2025
PDF
IT Consulting Services to Secure Future Growth
PDF
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
PPTX
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
PDF
IDM Crack 6.42 Build 42 Patch Serial Key 2025 Free New Version
PPTX
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
PDF
infoteam HELLAS company profile 2025 presentation
PDF
What Makes a Great Data Visualization Consulting Service.pdf
PDF
Website Design & Development_ Professional Web Design Services.pdf
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
Viber For Windows 25.7.1 Crack + Serial Keygen
Internet Download Manager IDM Crack powerful download accelerator New Version...
Workplace Software and Skills - OpenStax
ROI from Efficient Content & Campaign Management in the Digital Media Industry
Human Computer Interaction lecture Chapter 2.pptx
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
CapCut PRO for PC Crack New Download (Fully Activated 2025)
ROI Analysis for Newspaper Industry with Odoo ERP
Understanding the Need for Systemic Change in Open Source Through Intersectio...
Lumion Pro Crack New latest version Download 2025
IT Consulting Services to Secure Future Growth
PDF-XChange Editor Plus 10.7.0.398.0 Crack Free Download Latest 2025
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
IDM Crack 6.42 Build 42 Patch Serial Key 2025 Free New Version
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
infoteam HELLAS company profile 2025 presentation
What Makes a Great Data Visualization Consulting Service.pdf
Website Design & Development_ Professional Web Design Services.pdf

Privileged Account Management - Keep your logins safe

  • 1. Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Privileged Account Management (PAM) Jens Albrecht B.Sc. Electrical Engineering Presales Cyber Security [email protected] Brunnmatt 14 CH-6330 Cham Privileged access perfectly protected
  • 2. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 2 • Human (Domain Administrator, CxO, Web Portals…) • Non-human (Service Account, SU, root, Web Master, Router) • They access, control and manage IT environments / services • Are targets for IT attacks to get system access to compromise CIA (Confidentiality, Integrity, Availability) What are Privileged Accounts? Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 3. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 3 • Use very long and complex passwords • Change passwords periodically • Share passwords only on a secure way (better don’t share) • Monitor and audit the Account usage  This is difficult to implement  How to protect Privileged Accounts? Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 4. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 4 • Define password policies for privileged accounts • Automatically changes passwords for privileged accounts • Doesn’t allow privileged accounts to be directly shared • Monitors and records sessions for privileged account activity  Can be done very easily with a PAM system  How Privileged Account Management helps you? Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 5. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 5 • The Windows password expires after a period or a date • A new Windows password will be automatically generated • E.g. the jump account for Windows RDP sessions Example 1: Automatically change passwords Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 6. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 6 • The PAM system provides an RDP launcher for autologin • The Windows password isn’t visible for the operator • E.g. to access Domain Controllers Example 2: Use PAM for autologin for RDP Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 7. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 7 • The PAM systems starts the Web Password Filler for autologin • The password will not be shown to the operator • E.g. access to any web portals Example 3: Use PAM for autologin to web portals Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 8. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 8 • The PAM systems provides session recording • RDP, Web, PuTTY • Video on DB or disk Example 4: Use PAM for Auditing / Compliance Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 9. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 9 • We’ve chosen Secret Server from world leader www.thycotic.com Our PAM solution for you Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 10. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 10 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Fully-featured PAM solution available both on-premises and in the cloud Secret Server Establish Vault Discover Unknown Accounts Manage Secrets Delegate Access Control Sessions
  • 11. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 11 • With Thycotic, your start into PAM is made easily Our PAM solution for you Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 12. 1405002 rev 6.27.14 Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 12 • Get in touch with us and get your free Thycotic consultancy  • Start a trial / PoC / Rapid Prototyp in your lab / production • Discover Privileged Accounts in your environment and manage them with the PAM system. Start with Windows Accounts. • Your contact for PAM: [email protected] Your next steps for PAM Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
  • 13. Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Realize the Promise of Technology

Editor's Notes

  • #3: Privileged accounts are everywhere in the IT environment. They give IT the building blocks for managing vast networks of hardware and software that power the information-driven world. Yet for most people, they’re invisible. This gives you the basics of privileged account management (PAM) — understanding privileged accounts, what they do, and why it’s so important to protect access to them as the “keys to the kingdom” of your growing information empires. The typical user of a privileged account is a system administrator (sysadmin) responsible for managing an environment or an IT administrator of specific software or hardware.
  • #4: Sensitive data and critical functions are concentrated in business applications such as ERP, HR, and CRM systems. Users of these applications aren’t IT staff and aren’t using domain admin accounts. They do, however, have privileged access and many opportunities to increase risk. Business users are notoriously poor at protecting passwords. People often use the same password across multiple applications and share credentials with others. People use the same password for personal use as for business use, which expands the attack surface. When attackers compromise a privileged account, they can perform malicious activity, steal sensitive information, commit financial fraud, and often remain undetected for weeks or months at a time. Most cybersecurity breaches go undetected for more than 200 days.
  • #10: thycotic.com Why Choose Thycotic Stay Ahead Of Attackers. Prepare For Audits. Protect What Matters Most. Thycotic empowers more than 12.5k organizations around the globe, from small businesses to the Fortune 500, to manage privileged access. We make enterprise-grade privilege management accessible for everyone by eliminating the need for complex security tools and prioritizing productivity, flexibility and control. You’ll achieve more with Thycotic than with any other privilege security tool.
  • #11: thycotic.com Why Choose Thycotic Stay Ahead Of Attackers. Prepare For Audits. Protect What Matters Most. Thycotic empowers more than 12.5k organizations around the globe, from small businesses to the Fortune 500, to manage privileged access. We make enterprise-grade privilege management accessible for everyone by eliminating the need for complex security tools and prioritizing productivity, flexibility and control. You’ll achieve more with Thycotic than with any other privilege security tool.
  • #13: Get in touch with Jens Albrecht [email protected] / Ingram Micro Switzerland