First, terminology - there really is no such thing as privileged identity management. PAM systems broker access to existing accounts and other entitlements - they do not normally create or manage the lifecycles of identities (login accounts, etc.) which is what identity management means. That's just a misnomer introduced and later abandoned by some vendors.
As for the link between ML/AI and PAM - it is basically to identify unusual but authorized access and trigger either extra authorization or at least alerts.
It's normal that John connects to root on the Linux server M-F in the morning, but it's really strange at 3AM on Saturday, so invite John's manager to approve the odd-looking request.
@Idan Shoham PIM could mean the Identity Management itself is controlled by privileged access controls. We have a secure configuration storage solution that would provide just such an implementation. Control of access to the Identity Management process could be controlled by our platform.
Search for a product comparison in Privileged Access Management (PAM)
Typically any new latest PAM comes with a great number of options for automation. Integration with JSON scripts is also possible. It depends on what is the use case you want to achieve. If an ML can trigger AI to send some request to PAM then based upon the input received and configured automation rules in PAM the action will be taken. BeyondTrust PAM can do this.
AI & ML helps in proactive threat intelligence modules, risk rating. Also, to automate operations. For eg CyberArk has a module names PTA ( privilege threat analytics )
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
First, terminology - there really is no such thing as privileged identity management. PAM systems broker access to existing accounts and other entitlements - they do not normally create or manage the lifecycles of identities (login accounts, etc.) which is what identity management means. That's just a misnomer introduced and later abandoned by some vendors.
As for the link between ML/AI and PAM - it is basically to identify unusual but authorized access and trigger either extra authorization or at least alerts.
It's normal that John connects to root on the Linux server M-F in the morning, but it's really strange at 3AM on Saturday, so invite John's manager to approve the odd-looking request.
@Idan Shoham PIM could mean the Identity Management itself is controlled by privileged access controls. We have a secure configuration storage solution that would provide just such an implementation. Control of access to the Identity Management process could be controlled by our platform.
Typically any new latest PAM comes with a great number of options for automation. Integration with JSON scripts is also possible. It depends on what is the use case you want to achieve. If an ML can trigger AI to send some request to PAM then based upon the input received and configured automation rules in PAM the action will be taken. BeyondTrust PAM can do this.
AI & ML helps in proactive threat intelligence modules, risk rating. Also, to automate operations. For eg CyberArk has a module names PTA ( privilege threat analytics )