Published: 25 July 2022
Summary
Exploitation of privileged accounts is a prime vector for breaches. Cyberinsurance companies are demanding the use of PAM tools. Effective PAM is more important than ever. Security and risk management leaders can use this research to compare the effectiveness of PAM tools.
Included in Full Research
Overview
Key Findings
As last year, many vendors are offering SaaS-delivered privileged access management (PAM), with some moving toward a model that emphasizes their cloud offerings over software-delivered PAM.
Several vendors are beginning to position themselves as providers of converged identity platforms, but the effectiveness of this approach is generally contingent on embracing a single-provider approach.
Interest in secrets management has continued to grow as more vendors add this functionality to their PAM products, albeit with varying degrees of success.
Cloud infrastructure entitlement management (CIEM) remains a growth area, with almost half the vendors surveyed offering at least some notable capabilities in this area.
To view the entire document, log
in or purchase
Strategic Planning Assumption
- ARCON
- BeyondTrust
- Broadcom (Symantec)
- CyberArk
- Delinea
- Hitachi ID
- ManageEngine
- Netwrix
- One Identity
- Saviynt
- WALLIX
- Privileged Access Governance
- Account Discovery and Onboarding
- Privileged Credential Management
- Privileged Session Management
- Secrets Management
- Logging and Reporting
- PEDM — UNIX/Linux
- PEDM — Windows
- Automation and Adjacent Integration
- Ease of Deployment and Maintenance
- Performance and Availability
- Just-in-Time PAM Methods
- CIEM
- PASM
- Windows PEDM
- UNIX/Linux and macOS PEDM
- Secrets Management
- CIEM
Gartner Recommended Reading
Critical Capabilities Methodology