Keeping privileges to a minimum: What value does PAM bring to the channel?

A glowing blue padlock disintegrates against a black background
(Image credit: Shutterstock)

Remote working is here to stay, and the channel is pivotal in supporting organisations in their efforts to maintain the best protection against cyber attacks whether they’re adopting a hybrid, or fully remote working model. Channel partners with a rich portfolio of security solutions are in the ideal position to facilitate these flexible models and provide organisations with the seamless IT support they need to connect workers securely, irrespective of their location.

At the heart of remote cyber security is privileged access management (PAM), the protection around privileged and sensitive user accounts, which are the crown jewels for cyber criminals. For the channel, PAM creates a new revenue stream and further business opportunities with their customers. However, while having unrestricted access to clients’ IT estates is part and parcel for a service provider, it does pin a huge target on their backs. Offering comprehensive PAM solutions will enable channel partners to secure, manage and monitor access to their own privileged accounts as well as those of their clients, keeping the most valuable keys to their network safe.

Why is PAM so essential?

Cyber attacks have ramped up over the past few years, with phishing now the most common threat vector used by criminals to harvest sensitive credentials. A well crafted phishing campaign can provide a relatively straightforward entry route for cyber criminals and they are often the first step in longer, multistage attacks. Once successful, criminals can move onto the next phase, often involving stolen credentials that lead them on to access privileged user accounts. Industry experts estimate that up to 80 percent of all security breaches involve the compromise of privileged accounts.

Unsurprisingly, demand for PAM is high and channel partners have a key role to play in supporting clients by managing and protecting privileged accounts in increasingly complex IT environments. This starts at the implementation stage as misconfigured PAM can make daily tasks overly restrictive and become a barrier for workers trying to access documents and data for their jobs. From there, PAM facilitates protection through a number of features, including secure credential management, password masking and rotation, and flagging abnormal use of credentials and privileged account activity.

Having to manage thousands of sensitive credentials across the network, whilst complying with legal regulations, creates huge challenges for organisations and can be a significant drain on resources. Channel partners are key to removing the headache of managing this responsibility, plus the cyber risks that come with it. PAM solutions can improve security during the permission assignment process, as well as tracking activity within privileged accounts to ensure the right employees have the necessary access to do their jobs.

What are the biggest opportunities for the channel?

Lack of visibility of privileged users, accounts, and assets means that teams often lose track of who still has access to what. The rapid pace of digital transformation and widespread shift to the cloud over the past year has exacerbated these security risks. In some cases, past employees are still granted access to sensitive information, greatly increasing the company’s overall risk exposure. Without being able to track these privileges, businesses leave themselves open to attacks.

Partners with PAM in their portfolio are armed and ready to support these organisations to get user accounts under control. There are several layers of value that PAM can offer the channel, including removing the need to store passwords and other credentials locally – which is a huge security risk – as all credentials are kept in a cloud vault with high level encryption. Software-as-a-Service (SaaS) technologies can automatically retrieve credentials from the vault without admins ever seeing them, and identity management tools can provide role-based access controls to ensure the correct permissions are assigned. Further, service providers can deliver evidence to customers of who has access to each part of the network and at what times.

Keeping up with the ever-changing security landscape

More advanced and sophisticated methods within attack vectors open up each day, as evidenced by the SolarWinds breach and the Colonial Pipeline incident, bringing with them countless numbers of criminals looking to exploit any weaknesses left unchecked. At the same time, the number of cyber attacks resulting in massive credential theft has doubled over the past five years, so the channel must be prepared to face this trend head on; just one unprotected user account could be the lit match in a dry field.

Remote working will continue to throw challenges and obstacles into the path of business security, and so the channel and enterprises alike will need to stay on top of their cyber security strategies. With identity now the main target for attackers, solutions that strengthen defences around this will remain fundamental to long-term success. To deliver the highest level of consultancy to their customers during this process, service providers must be able to advise on these latest solutions: this not only opens up new and ongoing revenue streams but helps to position them as trusted advisors equipping clients with the most innovative solutions to protect their most sensitive and valuable assets. Adding PAM to their growing portfolio of services will strengthen partners’ positions when it comes to assisting businesses in their fight against cybercriminals and maintaining their trust for years to come.

Kamel Keus is VP EMEA at ThycoticCentrify

Read more
3D glass wavy background. Science fiction or information technology concept.
How the channel can simplify cybersecurity to build trust and agility for SMBs
Hand holding glowing sphere with shooting off purple ribbons of light
The AI challenge for the channel
Hand with a judge's gavel with in a futuristic background
How the IT channel can help on the route to cybersecurity regulatory compliance
A glowing blue CGI representation of a network solution provided via the IT channel.
Why understanding the customer’s network unlocks its value and your success
A mysterious light trail descending a mountain slope
The role of the MSP in lighting the path to a revised cloud strategy for the mid-market
Application security concept image showing a digitized padlock placed upon a digital platform.
Keeper Security launches revamped partner program for 2025
Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?