Skip to content
Home
Solutions
Privileged Access Management
Privilleged Session Manager
Application Identity Management
Audit and Compliance
Remote Work
Database Protection
Service Management
Resources
News
Demos
Glossary
Contact Us
X
Request a Demo
PAM Glossary
Improve your vocabulary and advance your IT security knowledge
A
Active Directory (AD)
Active Directory (AD) Bridging
Active Directory (AD) Security
Active Directory Authentication
Application Secrets
Application-to-Application Password Management (AAPM)
B
Brokered Authentication Service
D
DevOps Sercurity
E
Enterprise Password Management
I
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Lifecycle Management (ILM)
J
Just-in-Time Access (JIT)
L
Least Privilege
Local System Account
P
Password Vaulting
Privileged Access Governance (PAG)
Privileged Access Management (PAM)
Privileged Access Management (PAM) Tool
Privileged Access Management as a Service (PAMaaS)
Privileged Access Workstation (PAWs)
Privileged Account and Session Management (PASM)
Privileged Account Management
Privileged Identity Management (PIM)
Privileged Account
R
Remote Desktop Protocol (RDP)
Remote Process Automation (RPA)
Role Based Access Control (RBAC)
S
Secure Shell (SSH)
Security as a Service (SaaS / SecaaS)
Security Assertion Markup Language (SAML)
Security Information and Event Management (SIEM)
Self-Service Password Reset (SSPR)
Service Account Governance (SAG)
Shared Account Password Management (SAPM)
Single Sign On (SSO)
Software Change and Configuration Management
Superuser Privilege Management (SUPM)
U
User Account Control (UAC)
User and Entity Behavioral Analytics (UEBA)
V
Vendor Privileged Access Management (VPAM)
W
Web Access Management (WAM)
Z
Zero Standing Privileges (ZSP)
Zero Trust
Scroll Up