Abstract
Privileged access management (PAM) is often referred to as privileged account management (also PAM), privileged identity management (PIM), or privileged user management (PUM). The differences are subtle, and PAM (using access) is favored over the other in the analyst community. The discipline is considered a subset of the identity and access management (IAM) or identity and access governance (IAG) market as defined by leading standards organizations and analysts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Copyright information
© 2020 Morey J. Haber
About this chapter
Cite this chapter
Haber, M.J. (2020). Privileged Access Management. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5914-6_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5914-6_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5913-9
Online ISBN: 978-1-4842-5914-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)