Privileged Identity Management is based on the idea that a common element of most advanced threats involves obtaining the credentials of an administrator, super-user or even a program with local admin rights. The tools lock down those special user credentials so that even successful breaches are only done against low-level endpoints that cant do much harm. This is still an evolving area, and companies are approaching it from different perspectives. For that reason, this is not a head-to-head comparison, but more of an analysis of how each vendor approaches PIM.”]

