Take Control of Privileged Access Before Attackers Do