Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data:
• The business inputs to data strategy decisions via a policy
• The technology levers needed to monitor production data
based on the policies.
Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care—from near-term demands for regulatory and quality reporting to transforming care delivery.