To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution.
Behavior as authentication
Peter Gyöngyösi, product owner of Privileged Account Analytics at Balabit, said it is time to use behavior as an authentication. Behavioral tools can track habits of the user (i.e., typical time of day and activities performed), the devices and technologies uses (i.e., touchpad versus mouse and keyboard; desktop or tablet), and the way individuals operate the devices and technologies (i.e., the software can detect between a touch typist and someone who uses one finger). The more the PAM solution knows about a user’s behavior, the better it can detect the difference between a legitimate user and a potential hacker.