{"id":3613,"date":"2021-07-03T11:21:12","date_gmt":"2021-07-03T15:21:12","guid":{"rendered":"https:\/\/chrisgrundemann.com\/?post_type=avada_portfolio&#038;p=3613"},"modified":"2021-07-21T11:21:32","modified_gmt":"2021-07-21T15:21:32","slug":"key-criteria-for-evaluating-privileged-access-management-v1-0","status":"publish","type":"avada_portfolio","link":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/","title":{"rendered":"Key Criteria for Evaluating Privileged Access Management v1.0"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Privileged Access Management (PAM) enables administrative access to critical IT systems, while minimizing the chances of security compromises through monitoring, policy enforcement, and credential management.<\/p>\n<p>This report looks at the risks of staff or partners with more than standard user access and considers how a PAM solution can ensure these privileges are only used when and where appropriate. In it we explore how PAM solutions provide elevated access (such as server administration and security policy management), without revealing credentials&#8230;<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/gigaom.com\/report\/key-criteria-for-evaluating-privileged-access-management\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Keep Reading<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4261,"featured_media":3614,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"portfolio_category":[981],"portfolio_skills":[992],"portfolio_tags":[976,1094,1095,995],"class_list":["post-3613","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-content-creation","portfolio_skills-research","portfolio_tags-gigaom","portfolio_tags-pam","portfolio_tags-privileged-access-management","portfolio_tags-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T15:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/nick-HnWlli4ZZRI-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/\",\"name\":\"Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/nick-HnWlli4ZZRI-unsplash.jpg\",\"datePublished\":\"2021-07-03T15:21:12+00:00\",\"dateModified\":\"2021-07-21T15:21:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/nick-HnWlli4ZZRI-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/nick-HnWlli4ZZRI-unsplash.jpg\",\"width\":2304,\"height\":1536,\"caption\":\"Key Criteria for Evaluating Privileged Access Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/key-criteria-for-evaluating-privileged-access-management-v1-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Content Creation\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio_category\\\/content-creation\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Key Criteria for Evaluating Privileged Access Management v1.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/","og_locale":"en_US","og_type":"article","og_title":"Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann","og_url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/","og_site_name":"Chris Grundemann","article_modified_time":"2021-07-21T15:21:32+00:00","og_image":[{"width":2304,"height":1536,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/nick-HnWlli4ZZRI-unsplash.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ChrisGrundemann","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/","url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/","name":"Key Criteria for Evaluating Privileged Access Management v1.0 ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/nick-HnWlli4ZZRI-unsplash.jpg","datePublished":"2021-07-03T15:21:12+00:00","dateModified":"2021-07-21T15:21:32+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/nick-HnWlli4ZZRI-unsplash.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/nick-HnWlli4ZZRI-unsplash.jpg","width":2304,"height":1536,"caption":"Key Criteria for Evaluating Privileged Access Management"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/key-criteria-for-evaluating-privileged-access-management-v1-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/"},{"@type":"ListItem","position":3,"name":"Content Creation","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio_category\/content-creation\/"},{"@type":"ListItem","position":4,"name":"Key Criteria for Evaluating Privileged Access Management v1.0"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/4261"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=3613"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3613\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/3614"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=3613"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_category?post=3613"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_skills?post=3613"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_tags?post=3613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}