English
German
Portuguese
Spanish
The Lockdown Blog
Get a Quote
Services
Support
Login
+1-202-802-9399
(US)
Products
Privileged Access &
Password Management
Secret Server
Account Lifecycle Manager
Privileged Behavior Analytics
Password Reset Server
DevOps Secrets Vault
Connection Manager
Endpoint Privilege
& Application Control
Privilege Manager
Access Control
& Authentication
Cloud Access Controller
Remote Access Controller
Database Access Controller
Solutions
By Common
Security Issue
Enterprise
Password Management
Least Privilege Policy
Service Account
Management
Privileged Access
Management
Privileged Access
Management for the
Cloud
Remote Worker Security
By IT Role
& Responsibility
Audit & Compliance
DevOps
Help Desk
By Industry
or Sector
Healthcare
Financial Services
Energy & Utilities
Government
Education
Resources
Live &
On Demand
Webinars and
Weekly Demos
Digital Events
Conferences and
Tradeshows
Thycotic Videos
Podcasts
Original
Research
State of Least
Privilege Report
Global Cyber
Security Research
Results
State of PAM
Maturity Report
Black Hat Hacker
Survey Report
Guide to
Cyber Security
Decision Making
Guides And
Whitepapers
PAM Expert
Guide
Move Beyond GPO
Privileged Access
Management
Securing Privileged
Access Guide
Endpoint Privilege
Management Guide
Free
E-Books
Wiley’s Cybersecurity
for Dummies
Wiley’s PAM
for Dummies
Wiley’s Least Privilege
for Dummies
Wiley’s Service
Account Security
for Dummies
Wiley’s Privileged
Access Cloud
Security for Dummies
Free IT Tools
Password Security
Tools
Secret Server Free
DevOps Secrets
Vault Free
Browser-Stored Password
Discovery Tool
Glossary
PAM
vs.
PIM
vs.
IAM
Active Directory Weak
Password Finder
Privilege Management
Tools
Service Account
Discovery Tool
Least Privilege
Discovery Tool
Windows Privileged
Account Discovery Tool
Connection Manager
Free
Business Case for
PAM Toolkit
Self-Assessment
Tools
PAM Maturity Model
Privileged Access
Management
Checklist
Customizable
Templates
Privileged Access
Management
Policy Template
Incident Response
Template
PAM Software
Vendor TCO Checklist
Company
Why Choose
Thycotic
Why Choose Thycotic?
Thycotic Brochure
Trust Center
Contact Us
Customer
& Analysts
Customers
Testimonials
Case Studies
What the
Analysts Say
About
Thycotic
Merger Status Update
Leadership
Careers
Company News
In the Press
Thycotic Social
Company
Brochures
Product Datasheets
Partners
Partner
Program
Overview
Thycotic Rewards
Partner Application
Partner
Locator
Find a Partner
Tech Alliance
Program
Thycotic Integrations
Center
Strategic Partnerships
Partner
Resources
Partner Hub
Register A Deal
Register a Referral
Free Trials
Privileged Access &
Password Management
Secret Server
Account Lifecyle
Manager
Privileged Behavior
Analytics
Endpoint Privilege
& Access Control
Privilege Manager
Get Pricing
Now
Request a
Quote
ThycoticCentrify is now Delinea!
delinea.com
Thycotic PAM Glossary
Learn about Privileged Access Management and Cyber Security
▲
A
C
D
E
I
J
L
M
P
R
S
U
V
W
Privileged Account
Thycotic
 
Like this post?
Get our top blog posts delivered to your inbox once a month.
SHARE THIS
Other posts you might like
Passwordless authentication: making the vision a reality
Key Takeaways from the Verizon Data Breach Investigations Report 2022
Privileged Access for Cloud-Native Workloads (Cloud PAM): Securing Identities in dynamic environments; on-premise, hybrid & public cloud
Secure Remote Access Paradigms Pros and Cons
Other Glossary Entries
A
Active Directory (AD) Security
C
Cloud Computing Security
D
Defense-in-Depth (DiD)
DevOps Security
E
Endpoint Detection and Response (EDR)
I
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Lifecycle Management (ILM)
J
Just-in-Time Access
L
Least Privilege
M
Machine Identity Management (MIM)
P
Pass-the-Hash-Attack (PtH)
Privilege Elevation and Delegation Management (PEDM)
Privileged Access Workstations (PAWs)
Privileged Account Management (PAM)
R
Role Based Access Control (RBAC)
S
Self-Service Password Reset (SSPR)
U
User and Entity Behavioral Analytics (UEBA)
W
Web Access Management (WAM)