This book gives IT professionals a practical understanding of privileged account management (PAM). It describes what privileged accounts are, where they reside throughout an IT environment, and how they function. Most important, this book explains the risks associated with these accounts and how to best protect them from hacker and malicious insider threats.
This book has been written for IT administrators, systems administrators, and security professionals responsible for protecting their organizations from security threats. It assumes a basic level of IT expertise and experience in managing IT networks and exposure to the use of privileged accounts and passwords as part
of daily tasks. That said, this book may also be helpful in educating business users and others as to the importance of privileged account security practices.