Published: 09 September 2024
Summary
Privileged access represents a significant security risk for every organization, and effective PAM is more important than ever. Most organizations continue to struggle with deployments, but security and risk management leaders can use this research to evaluate the most essential PAM capabilities.
Included in Full Research
Overview
Key Findings
SaaS-delivered privileged access management (PAM) is the primary delivery method for the majority of vendors in this research, with many moving toward a model where differentiated capabilities exist exclusively as SaaS.
Privileged session management (PSM) isincreasingly mature, with fewer distinctions across the evaluated vendors, but differentiation remains in other PAM capabilities, such as secrets management, JIT, UNIX/Linux PEDM, and account discovery and onboarding.
The interest in secrets management has continued to grow, with all evaluated vendors making modest to significant improvements in their offerings, both organically and through acquisitions.
Cloud infrastructure entitlement management (CIEM) remains an area for differentiation and
Clients can log in to view the entire
document.
- ARCON
- BeyondTrust
- Broadcom (Symantec)
- CyberArk
- Delinea
- ManageEngine
- Netwrix
- One Identity
- WALLIX
- Privileged Account Life Cycle
- Account Discovery and Onboarding
- Privileged Credential Management
- Privileged Session Management
- Privileged Remote Access
- Workload ID and Secrets Management
- PEDM: UNIX/Linux
- PEDM: Windows
- Deployment/Maintenance/Integration
- Performance and Availability
- Just-in-Time PAM Methods
- CIEM
- PASM
- Windows PEDM
- UNIX/Linux and macOS PEDM
- Secrets Management
- CIEM
- RPAM
Critical Capabilities Methodology