Back to Search

Iam and Pam Cybersecurity: Securing Identities and Access Management in the Digitalization Era

AUTHOR Nardone, Massimo
PUBLISHER Apress (10/23/2025)
PRODUCT TYPE Paperback (Paperback)

Description

In today's digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies--making it essential for zero-trust security, compliance, and efficiency.

Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.

Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.

Readers will learn:

- Why securing identities is critical today

- Key differences between IAM and PAM

- Major access management risks and challenges

- Common IAM and PAM solutions (e.g., Azure AD, Okta, CyberArk, BeyondTrust, SSH Communications Security)

Show More
Product Format
Product Details
ISBN-13: 9798868820182
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 137
Carton Quantity: 52
Product Dimensions: 6.14 x 0.32 x 9.21 inches
Weight: 0.48 pound(s)
Feature Codes: Illustrated
Country of Origin: NL
Subject Information
BISAC Categories
Computers | Security - Network Security
Descriptions, Reviews, Etc.
publisher marketing

In today's digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies--making it essential for zero-trust security, compliance, and efficiency.

Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks.

Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.

Readers will learn:

- Why securing identities is critical today

- Key differences between IAM and PAM

- Major access management risks and challenges

- Common IAM and PAM solutions (e.g., Azure AD, Okta, CyberArk, BeyondTrust, SSH Communications Security)

Show More

Author: Nardone, Massimo
Massimo Nardone holds a Master of Science degree in Computing Science from the University of Salerno, Italy. He worked as a PCI QSA and Senior Lead IT Security/Cloud/SCADA Architect for many years, and currently works as the Security, Cloud and SCADA Lead IT Architect for Hewlett Packard Finland. He has more than 20 years of work experience in IT, including Security, SCADA, Cloud Computing, IT Infrastructure, Mobile, Security and WWW technology areas for both national and international projects. Massimo has worked as a Project Manager, Cloud/SCADA Lead IT Architect, Software Engineer, Research Engineer, Chief Security Architect, and Software Specialist. He worked as visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University). He has been programming and teaching how to program with Perl, PHP, Java, VB, Python, C/C++ and MySQL for more than 20 years. He is the author of Beginning PHP and MySQL (Apress, 2014) and Pro Android Games (Apress, 2015).

He holds four international patents (PKI, SIP, SAML and Proxy areas). This book is dedicated to Pia, Luna, Leo e Neve who are the beautiful reasons of his life.

Show More
List Price $22.99
Your Price  $22.76
Paperback