The concept of passwordless administration is generally linked to just-in-timePAM, since the methods of applying passwordless administration can cover several technologies to temporarily elevate the user or the application for the specific requested task. In other words, in lieu of entering secondary administrative credentials, the user is trusted based on context.
As threats continue to grow and become more sophisticated, it’s important to understand that not all organizations have the time nor resources to manage a modern security operations center,” said Mark Hughes, senior vice president and general manager, Security, DXC Technology.