Identity & Access Management , Security Operations

How Do You Migrate PAM to the Cloud?

Peter Gankin of Takeda Shares His Company's Journey
Peter Gankin, head of identity and access management, Takeda

What are some challenges of shifting on-premises PAM to the cloud, and how should you go about it? Peter Gankin, head of identity and access management at Takeda, a Japanese multinational pharmaceutical company, shares his views.

See Also: Live Webinar Today | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

"When you migrate to the cloud, there are a couple of options. You either migrate to the cloud server or have SaaS solutions. Because PAM as a SaaS platform was new, we decided to migrate to the cloud server," Gankin says.

"We had a dedicated team at Takeda to support the cloud migration. The movement was not easy since PAM requires servers to be super secure and AWS by default is not designed this way. So we had to manually set up servers individually."

In a video interview with Information Security Media Group, Gankin also discusses:

  • The nontechnical challenges of shifting to the cloud;
  • The entire process of PAM cloud migration;
  • Recommendations on cloud migration.

Gankin has been part of the IAM team at Takeda for the past six years. Previously, he was with AbbVie as lead engineer for endpoint protection.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.