Archive for

IAM

Introduction to Endpoint Privilege Management (EPM)–Part III

Posted: June 26, 2019
Category: IAM

Hello and welcome back to my blog series on Endpoint Privilege Management.  This is the third and final installment covering common requirements and the features they map to, what’s involved in deploying and maintaining a solution, and how to work with a vendor to do a POC ...

Continue Reading

Introduction to Endpoint Privilege Management (EPM)–Part II

Posted: June 10, 2019
Category: IAM

Hello and welcome to the second of a three-part blog post series covering Endpoint Privilege Management (EPM).  If you’ve stumbled across this and are unfamiliar with the topic, you may want to check out Part I for a high-level overview; otherwise, let’s go ahead and jump right in. How does ...

Continue Reading

Endpoint Privilege Management – Starting a Blog Series

Posted: May 20, 2019
Category: IAM

Hello and welcome to a new blog post series covering Endpoint Privilege Management (EPM) and the challenges (and benefits) related to managing user privileges.  Over the next several weeks, I’ll be covering various aspects of what we at Set Solutions have learned evaluating and deploying EPM ...

Continue Reading