"A new layer of security in organizations, focused specifically on the protection and management of identities, is a critical new requirement in efforts to stem the tide of breaches. Of these identities, none are so critical as those belonging to privileged users.
Malicious users predictably follow a logical series of steps in order to successfully carry out their attacks. These sequences are called ""kill chains"" based on the fact that if the sequence of steps attackers follow can be interrupted, or ""killed"" at any point, the ultimate attack can be prevented or mitigated. Privileged access management provides the means to thwart attackers at multiple steps in the attack lifecycle."