Privileged Task Management is the next generation of Privileged Access Management (PAM) technology.
If you haven't heard of PAM, it refers to security processes and technologies to control elevated (“privileged”) access (i.e. Administrator accounts). This is usually accomplished by putting the privileged credentials inside a secure repository (a vault). This has the effect of isolating the use of privileged accounts to reduce the risk of those credentials being stolen or used incorrectly.
PAM's major weakness is that once a user is given access to a privileged credential stored in the vault, they can use this credential to do whatever they want. PTM was designed to solve this problem. PTM removes all native access to systems and data. Instead, users perform operations via automated Tasks.
PTM Tasks are delegated to the people that need to perform the Task. Tasks are programmed, repeatable, controlled; no trust is required. A user can perform only the operation allowed within the task. Tasks are delegated to roles or individuals within the organizations, whether that is an admin, helpdesk or business user. Tasks provide the benefit of a secure framework for operations but also provide optimal efficiency through automation. When a Task is executed, an audit record is captured that properly tells the story of the business task being performed; the who, what, where, and when of the operation.
PTM is a business-centric approach where the operational tasks are modeled and delegated to the people that need those tasks. PTM provides significant business benefits:
At the heart of PTM is a modeled Task. PTM makes it simple for an organization to model complex tasks. In just a few hours, an organizations first Tasks become operational with the following benefits:
Cloudbridge is the undisputed leader in the PTM space. Cloudbridge makes it simple to implement PTM. Cloudbridge includes hundreds of already-modeled Tasks for managing users, groups, mailboxes, mailflow, and more. Cloudbridge makes it extremely simple to model Tasks using familiar PowerShell and then provides instant Web Portals where Tasks can be delegated to roles or individuals in the organization. In under 30 minutes, typical organizations are getting PTM value. 24 hours later, several more tasks have been modeled and will never again require privileged access. With each additional day more tasks are modeled and automated, freeing up more of IT's time via a snowball effect. In a few months, an organization has achieved zero trust across many disciplines, the business becomes increasingly secure, and increasingly empowered with automation.
Go to the Cloudbridge website to get more information on PTM and how it is more secure than PAM.