Insights

Privileged Access Management

Privileged access management can become very complex if we let all the different technologies involved overwhelm us too soon.

But at its heart PAM has one simple task: to ensure that access to secrets is as secure as possible and only for those people authorised to see them.

Guide
Guide
Privileged Access Management: Nearly Everything You Need to Know to Get Started
Your guide to why Privileged Access matters to your business. Learn about the basics to get started with PAM.
Learn more
KC Open Select
KC Open Select
Privileged Access Management
Create a shortlist of solutions tailored to privileged access management your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Blog
Blog
What's the Next Generation in PAM?
Before there were PAM solutions everyone was given access to privileged accounts with little regard or control as to who had access to them, when they had access and what they did with that...
Learn more
Whitepaper
Whitepaper
Securing Non-Human Identities
This KuppingerCole Whitepaper looks at issues IT managers and security strategists face trying to manage identity and access in complex multi-cloud IT infrastructures. It focuses on the challenges...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #54: Privileged Access in an Agile World - PAM for DevOps
The PAM market continues to evolve and many organizations are adopting the DevOps paradigm where critical access and sensitive accounts are required in fast moving and agile environments. Paul...
Learn more
Managing Privileged Access in Complex IT Environments for Business Benefit
Blog
Managing Privileged Access in Complex IT Environments for Business Benefit
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials....
A New Pamocracy is Growing Inside Your Organization
Blog
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a...
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management)...
PAM in a Post-Pandemic Digital World
Blog
PAM in a Post-Pandemic Digital World
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Securing Industrial Control Systems (ICS)
Blog
Securing Industrial Control Systems (ICS)
Cybersecurity has become essential for every modern business, but has historically focused on securing information technology (IT) used by the administrative side of the business, rather than...
Privileged Access Management
Blog
Privileged Access Management
Credential theft is the most popular way cyber criminals use to access corporate environments, but real power comes from compromising privileged credentials, which is why Privileged Access...
Remote Working
Blog
Remote Working
In recent years remote working has become increasingly common to enable people to remain productive while away from the office. However, the Covid 19 pandemic resulted in an almost overnight need...
EIC Speaker Spotlight: Chris Owen on Identity Management
Blog
EIC Speaker Spotlight: Chris Owen on Identity Management
Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC...
PAM Is Changing and You Need to Know Why
Blog
PAM Is Changing and You Need to Know Why
What is left to say about PAM that has not already been said? Well in my opinion, quite a lot – as I hope you find out when you join me at the forthcoming KCLive Event, Operationalizing...
Centrify & Thycotic: Will 1+1 be 2? Or less? Or more?
Blog
Centrify & Thycotic: Will 1+1 be 2? Or less? Or more?
TPG Capital acquiring Thycotic in addition to Centrify, but leaving many questions unanswered Mergers and acquisitions are not uncommon in the tech industry, specifically in software. Even in...
10 Use Cases for Universal Privilege Management
Blog
10 Use Cases for Universal Privilege Management
Even before COVID-19 entered our lexicon, privileged access management (PAM) was widely recognized as a foundational cybersecurity technology . In recent years, almost every cyberattack has...
1 2 Next