- Computer security still relies on usernames and passwords for authentication and user/group IDs for authorization, leaving systems vulnerable to attackers who gain administrator-level access.
- Privileged Identity Management (PIM) systems like CA Privileged Identity Manager were introduced to control administrator access by granting privileged access only according to predefined protocols.
- CA Privileged Identity Manager uses kernel-level call intercepts and two-factor user identification to block even root-level access compromises, ensuring that only the original logged in user can access their private data, even if another user gains root/administrator access.