- Build the framework to govern end users'
- Elevate end users' access to the target application based on the just-in-time principle.
- Ensure the principle of least privilege
- Detect suspicious end-behavioral profiles on a real-time basis
- Offer fine-grained access to applications