A PAM tool should be able to support the business infrastructure from hardware to applications.
Allowing IT operations only the needed access to do their job, while leaving a complete audit trail about who used the account, why was it used and a session recording showing the whole session.
Privileged accounts are everywhere in the IT environment, and it is important to be in control of who has access to the passwords, who is using them, and when the passwords was last changed.
Even a simple application can be handled by many different privileged account types, and service accounts. Here is an example of a small application running on a virtual environment using a database to store data:
Qsec A/S - CVR-nr: 37854301