Access Management , Privileged Access Management , Security Operations

Using PAM in an OT Environment

Gartner's Felix Gaehtgens on Addressing Challenges
Felix Gaehtgens, vice president, analyst at Gartner

To enhance privileged access management for operational technology, organizations should use specialized remote access solutions for vendors that are allowed to access OT networks, says Felix Gaehtgens, an analyst at Gartner

"One of the primary tasks is to separate the authentication of the person that needs to log in from the actual authentication of the device," he says.

See Also: Cloud Identity Security and the Power of PAM

In a video interview with Information Security Media Group, Gaehtgens also discusses:

  • The challenges of setting up PAM for an OT environment;
  • Tips on launching PAM for OT;
  • Addressing PAM implementation challenges.

Gaehtgens is a vice president, analyst at Gartner who focuses on identity and access management. Previously, he was a technology adviser to large corporations and public institutions in Europe, the U.S. and Latin America. He was also involved in high-tech ventures, most recently as a co-founder of Symlabs, a virtual directory vendor, where he served as an interim CEO, product manager and architect.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.