Privilege escalation raises data breach threats. Discarding unnecessary “temporary privileges” is central to enforce the principle of least privilege and ensure robust Privileged Access Management.
PEDM enables to control and monitor non-admin (temporary privileged users). Access rights are automatically terminated after the completion of privileged activities. This feature allows an enterprise to gain operational flexibility.