Published: 06 September 2023
Summary
Privileged accounts are a prime vector for the exploitation of breaches. Effective privileged access management is more important than ever, and cyberinsurance companies are demanding the use of PAM tools. Security and risk management leaders should use this research to compare their effectiveness.
Included in Full Research
Overview
Key Findings
Many vendors offer SaaS-delivered privileged access management, with some moving toward a model that emphasizes their cloud offerings over software-delivered PAM.
Privileged account and session management is increasingly mature, with few distinct strata of capability among the evaluated vendors, and differentiation can be found in discovery, onboarding and just-in-time methods.
The interest in secrets management has continued to grow, as more vendors have experienced varying degrees of success adding this functionality to their PAM products.
Cloud infrastructure entitlement management remains an area for differentiation and innovation; visibility of entitlements in IaaS is something most vendors offer now, but most do not
Clients can log in to view the entire
document.
- ARCON
- BeyondTrust
- Broadcom (Symantec)
- CyberArk
- Delinea
- HashiCorp
- ManageEngine
- Netwrix
- One Identity
- Saviynt
- WALLIX
- Privileged Account Life Cycle
- Account Discovery and Onboarding
- Privileged Credential Management
- Session Management & Remote Access
- Workload ID and Secrets Management
- PEDM — UNIX/Linux
- PEDM — Windows
- Deployment/Maintenance/Integration
- Performance and Availability
- Just-in-Time PAM Methods
- CIEM
- PASM
- Windows PEDM
- UNIX/Linux and macOS PEDM
- Secrets Management
- CIEM
Gartner Recommended Reading
Critical Capabilities Methodology