PAM key features make the difference between a solution able to face advanced threats and a simple set of rules and policies. It takes more than using a complex password and removing admin rights for regular users to prevent a system breach.
Source: Heimdal Security Blog