Reduce IT Admin Risks and Costs with Privileged Access Management (PAM)
Control the access of your most critical users without breaking your budget.

RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.Not having a formal PAM process and solution means:
- Less visibility into the usage of these accounts and, therefore, less knowledge of potential problems.
- Wasting money on the operational side. Little management of those accounts means more help desk tickets related to admin login information and resources and costs spent on dealing with them.
Implementing PAM means:
- More protected admin accounts.
- Fewer issues with admin authentication, password sharing, etc.
- Fewer headaches for IT dealing with password reset tickets.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Project Rationale
The Purpose
- Understand the problem
- Review blueprint goals
- Understand value and impact of the project
- Determine baseline metrics
Key Benefits Achieved
- Defined scope of project
- Established value proposition
- Identify key success metrics
Activities: | Outputs: | |
---|---|---|
1.1 | Define baseline metrics |
|
1.2 | Record baseline metrics |
|
Module 2: Assess PAM Requirements
The Purpose
- Understand PAM’s impact on your security posture
- Establish your overall business case
- Document requirements
- Establish which apps/systems are in scope
- Conduct inventory
Key Benefits Achieved
- Make the case for why PAM is needed
- Identify holes in one of your critical systems to support the need for PAM
Activities: | Outputs: | |
---|---|---|
2.1 | Requirements gathering |
|
2.2 | Database/operating system inventory |
|
Module 3: Identify and Evaluate PAM Options
The Purpose
- Understand key PAM solution criteria
- Conduct current state analysis of PAM processes
- Conduct desired state analysis of PAM processes
- Understand key PAM solution criteria
- Review options
- Determine cost savings
Key Benefits Achieved
- Understand organizational needs based on what you currently do towards managing privileged accounts and where you want to be
- Identify how PAM will save your organization money
Activities: | Outputs: | |
---|---|---|
3.1 | Current state analysis |
|
3.2 | Future state analysis |
|
3.3 | Cost savings analysis |
|
Module 4: Communicate with Admins and Stakeholders
The Purpose
- Obtain admin support
- Secure stakeholder support
Key Benefits Achieved
- Communication and support for PAM from both stakeholders and the admins that PAM affects is crucial to the success of the implementation project
Activities: | Outputs: | |
---|---|---|
4.1 | Communication plan strategy for admins and stakeholders |
|
Module 5: Select a PAM Solution
The Purpose
- Understand vendor relations
- Use Info-Tech’s RFP Template to establish your requirements
- Use Info-Tech’s Vendor Demo Script to ensure clear communication
Key Benefits Achieved
- Understand what kind of information to give to vendors to ensure they find the best solution for your needs
Activities: | Outputs: | |
---|---|---|
5.1 | Understand RFP template and vendor demo script requirements |
|
Module 6: Implement PAM Solution
The Purpose
- Understand RFP template and vendor demo script requirements
Key Benefits Achieved
- Understand Work Breakdown Structure (WBS).
- Have a basis for how to roll out PAM
Activities: | Outputs: | |
---|---|---|
6.1 | RACI chart |
|
6.2 | Project step break down |
|