温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/experiencing-modern-privileged-access-management
点击访问原文链接

What Do Privileged Access Management, Bikes & E-bikes Have in Common?

What Do Privileged Access Management, Bikes & E-bikes Have in Common? About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers September 29, 2022 What Do Privileged Access Management, Bikes & E-bikes Have in Common? Written by: Teemu Tunkelo Sometimes you need to experience something firsthand to understand the real difference. I had one of those experiences in the Alps just recently.

I had heard about the benefits of electric bikes before. I sort of understood that it is less effort to ride an e-bike. What I did not understand is that it really is a paradigm shift in the experience of riding a bike. 

The first thing that hit me was acceleration. With an e-bike, you just pedal a few times with the boost on, and you’ve suddenly gained significant speed from a complete standstill.

The second thing was riding up rising slopes. On our way to the destination, we saw three young guys riding traditional bikes exerting huge effort just to keep some sort of momentum going on a steep hill. One of them was walking the bike. I was just cruising past these three gentlemen who were certainly more fit than I am. 

The saying ‘as easy as riding a bike’ has never been truer. Sometimes it’s not the rider, it’s the bike.

Experiencing Modern Privileged Access Management Just like the e-bike, a modern privileged access management (PAM) solution should make accessing challenging IT or Operational Technology (OT) terrains effortless for people who are not experts in using these tools. Putting the user experience at the forefront and making sure that the engine that runs the PAM solution is modern and capable to adapt to different access landscapes is the way to achieve this.

Here's a short description of the truly modern privileged access experience.

Log in using single sign-on (SSO) or biometric authentication. The PAM is synced with your Identity and Access Management (IAM) solution, and the linking of the right role with the right identity is automatic.   Once in, you only see the targets you are allowed to access as a list. It’s just one click and you’re in your destination.  Just like many bike apps, the PAM solution logs your activities and even records the whole session.  There’s no need for you to handle any passwords or keys at any point. It’s a smooth, uninterrupted, passwordless and keyless ride to the goal.  Charging up Privileged Access Management  A modern PAM may have the same framework as the old one, but the architecture is built to operate at cloud speed. It’s the same as with electric cars. The body is almost the same but the engine is entirely different. It’s because the e-car engine hasn’t been retrofitted from a combustion engine but designed completely anew to maximize the benefits of new technology.

So what’s under the hood of modern PAM software? 

The privileged access management tool scans the terrain, so you always have an up-to-date view on all your global cloud assets for access. The access management solution has an automatic boost. If you need to scale up your services, it can do so instantaneously and without much effort from you.  It leaves a minimal footprint in your environment with an immutable infrastructure approach. Passwordless and keyless access management eliminates the need to manage leave-behind credentials because there aren’t any.  Just like an electric engine, it has fewer moving parts. No software agents to install on the client or the server nor runtime changes to your environment. No need to vault, rotate and manage passwords or keys either.  Microservices architecture. Boost just the functionality you need at a given time. For example, if there is a spike in RDP connections, just ramp up that functionality without needing to ramp up the entire PAM instance.  You can turn off the e-assistance. In some IT and OT environments, you cannot use all of the latest features. You have to vault secrets or use a command line tool to access a target. A hybrid PAM solution can then work like your traditional bike to achieve what is necessary. Experience the Difference Between Modern PAM and Traditional PAM The traditional bike and e-bike look approximately the same. There’s also little difference with the way you operate the bike: brakes, gear, how you pedal, lights, etc. work as before. 

It’s the same with traditional PAM and modern, hybrid PAM. You might understand the difference between passwordless & keyless PAM and vaulting PAM on a cognitive level, but if you haven’t experienced it, it might be hard to get a real sense of the difference. 

But once you’ve had the experience, you don’t want to go back to vaulting, rotating, and managing passwords or keys anymore. Our customers say the same. Not a single one of them has ever gotten back to us and said “I wish I was still managing and rotating thousands of passwords like in the past”.  

Learn why KuppingerCole Analysts recognized our PrivX Hybrid Privileged Access Management solution as a leader for dynamic, hybrid cloud environments in the following categories:

Overall leader  Market leader  Innovation leader  Product leader  If you want to take our PrivX for a test drive, you can do so here.

 

Tag(s): Privileged Access Management , PrivX Teemu Tunkelo Dr. Teemu Tunkelo, former CEO at SSH (2020-2024), is an international business leader who has served major companies, such as Voith, Siemens, ABB, Invensys, and Compaq in global management and technology leadership roles for over 25 years in Zurich, London, Munich, Helsinki, and Cleveland (Ohio). His prior experience...

Other posts you might be interested in Privileged Access Management 8 min read | February 24, 2026 Why CPS Secure Remote Access Is Shifting from Connectivity to Operations Read More Privileged Access Management 6 min read | February 17, 2026 Zero-Day Cyberattack on Major Telcos in Singapore: Lessons on Securing Privileged Access to Critical Systems  Read More Privileged Access Management 6 min read | February 9, 2026 How to break up with your password Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录