Abstract

The subject matter of the article is cyber security incidents related to the violation of the rights of privileged users and the development of the market of PAM solutions over the past five years — 2017–2022. And there is also a process of safe and secure granting of access permissions to the organization's information systems with the provision and tracking of secure user activity in the company's business network and cloud environment. The goal and tasks are: determining the relevance and need for management and administrator access control tools, as well as studying the growth trends of the PAM service market. Determination of prospects for the development of a strategy for the implementation of PAM solutions for or in cloud environments. The methods used are: forecasting methods based on market analysis and conclusions from the presented reports of international companies regarding the development of PAM solutions and increasing demand for system data in the future, as well as observing trends in the transition of organizations' activities to the cloud environment with the development of cloud services: IaaS, PaaS, SaaS. The following results were obtained: the reports of CIS Controls, OWASP, Balabit, Gartner, Allied Marked Research and studies of global vendors: Heimdal security, Microsoft, IBM were considered, which made it possible to draw the necessary conclusions and prove the feasibility of using and increasing demand for PAM systems in the next ten years and prove the prospects and the need to implement a new PAM development strategy in the cloud through integration and blurring the boundaries with IAM. Conclusions. The scientific novelty of the obtained market research results indicates that the interest of PAM solutions on the part of customers, who will be aware of the need for access control tools for administrators, determines the further development and competitiveness of these systems. Increasing attack surfaces, increased security risks, the need to keep up with modern business processes — all this requires the implementation of new PAM solutions with an increased level of security, automation, as well as integration to ensure comprehensive information protection, which will become an integral part of the overall strategy information and cyber security of both enterprises and state institutions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call