Access Management , Endpoint Security , Identity & Access Management

Top Drivers for Privileged Account Management

Grant Burst of Wallix Says Operational Technology Driving More PAM Rollouts
Grant Burst, cybersecurity engineer, Wallix

When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities.

See Also: Beyond Pandemic: Right-Sizing the Cybersecurity Posture

But another dominant trend has been the range of sectors that are embracing PAM in large part because of the increasingly vast number of devices they must manage.

"When we're looking at the OT [operational technology] sector, when we're looking at power, water, manufacturing, these are all solutions that we never even thought about before needing this," Burst says. "But with the internet of things coming on, with everything being interconnected, we're seeing more and more wanting the control" that PAM provides.

In a video interview at the recent Infosecurity Europe conference, Burst discusses:

  • Key business challenges being faced by his customers;
  • Best practices for outsourcing PAM projects;
  • The importance of securing critical assets.

Burst is a cybersecurity engineer at Wallix, a European specialist in privileged account governance.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.