Leo technosoft Privileged Identity Management provides threat solutions on privileged accounts , this products ensures the secrecy of sensitive information and prevents
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
Pim Solution
1.
2. Introduction
Privileged Identity Management (PIM) is subcategory of Identity Management. Its purpose is
to focus on privileged accounts, important accounts used by the team of IT administrators or
sometime, people in the top brass of the organization
PIM focuses on select business users and applications that are crucial to the business
operations of the organization.
PIM Solutions ensure security for user accounts in the applications that are a part of IT
Infrastructure.
3. Features of PIM
Temper-proof storage
High availability modules and disaster recovery modules
Strong authentication support
FIPS 140-2 validated cryptography
Customizable “request workflows”
Segregation of duties
Real-time behavioural analytics
4. Use Cases with PIM
Access based on security & business rules- IP address/geo-location/time
Creation and deletion of accounts in short span
No password sharing/exposure
Single access
Enabling & disabling privilege users