Get Updates
Get notified of breaking news, exclusive insights, and must-see stories!

Practical Insights on Privileged Identity Management: Deployment, Testing, and Maintenance

Privileged Identity Management (PIM) is a critical security practice that helps organizations manage and monitor access to sensitive data and critical systems.

By controlling and tracking privileged accounts, PIM reduces the risk of data breaches and insider threats. In today's fast-paced digital environment, ensuring robust security is more vital than ever.

Seema Kalwani

With years of hands-on experience in testing and deploying security products, Seema Kalwani played a pivotal role in shaping the way modern PIM systems are tested, deployed, and maintained.

She began her testing career at CA Technologies in 2005, focusing on Control Minder, which is now known as Symantec CA PAM. Over a decade-long tenure until 2015, she developed a deep understanding of the product's complex architecture, the challenges of multi-platform testing, and the intricacies of managing privileged access.

At the time, security products were deployed on UNIX and Windows platforms, each requiring specialized knowledge to test effectively.

"One platform would work flawlessly while another would present unexpected failures," she recalls.

A team of more than 20 persons, including Unix and Windows experts, had to be deployed to face these challenges. Her meticulous testing diligence, alongside care for platform-specific nuances, ensured adequate coverage of the product and more robust security.

Her expertise went beyond the testing lab. Seema became a trusted voice for Control Minder, leading roadshows at client conferences and conducting training sessions for partners like Wipro and Infosys.

"Understanding the product inside out meant I could guide others in deploying it successfully," she reflects. Her hands-on experience with deployment revealed the complexities enterprises face, ranging from regulatory compliance to disaster recovery requirements.

Through these deployments, she learned the importance of crafting a detailed architectural blueprint before implementation. This included understanding network topology, opening necessary ports, and ensuring seamless integration with existing infrastructure.

"Deployment taught me how real-world environments can differ from testing labs and that knowledge helped us refine our testing process," she explains.

Her influence extended to the maintenance phase, where she played a key role in Level-2 support for five to six years post-deployment.

During this time, she encountered a broad spectrum of issues, from handling over 100,000 account passwords to resolving problems arising from version mismatches and complex account configurations.

This proactive approach involved documenting solutions for future use, creating a comprehensive knowledge base that empowered Level-1 support teams to resolve most issues independently. "By documenting every solution, we ensured that future problems could be resolved faster and more efficiently," she says.

This method significantly reduced escalation rates, allowing the Level-2 team to focus on critical enhancements and product upgrades.

As new team members joined, she recognized the challenges they faced in understanding the complex environment.

"A well-written document provides a map, it helps newcomers grasp the big picture while allowing experienced professionals to revisit and refine their understanding," she emphasizes.

The commitment to clear, detailed documentation has proven invaluable in maintaining operational continuity and accelerating onboarding.

For Seema, this area of PIM brought to light the need to consider the whole approach to testing, deployment, and maintenance. Her combination of deep technical knowledge along the lines of practical considerations of real-world challenges has shaped the best practices in privileged access management.

"Security is not just about testing for bugs, it's about understanding how a product fits within the larger enterprise ecosystem" she reflects.

Her input still guides guarding PIM approaches such that these critical systems can safely adapt, remain reliable, and find avenues to evolve with the technological future.

Notifications
Settings
Clear Notifications
Notifications
Use the toggle to switch on notifications
  • Block for 8 hours
  • Block for 12 hours
  • Block for 24 hours
  • Don't block
Gender
Select your Gender
  • Male
  • Female
  • Others
Age
Select your Age Range
  • Under 18
  • 18 to 25
  • 26 to 35
  • 36 to 45
  • 45 to 55
  • 55+