Insights

Privileged Access Management

Privileged access management can become very complex if we let all the different technologies involved overwhelm us too soon.

But at its heart PAM has one simple task: to ensure that access to secrets is as secure as possible and only for those people authorised to see them.

Guide
Guide
Privileged Access Management: Nearly Everything You Need to Know to Get Started
Your guide to why Privileged Access matters to your business. Learn about the basics to get started with PAM.
Learn more
KC Open Select
KC Open Select
Privileged Access Management
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that address some of the most urgent areas of Cybersecurity today.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Blog
Blog
Centrify & Thycotic: Will 1+1 be 2? Or less? Or more?
TPG Capital acquiring Thycotic in addition to Centrify, but leaving many questions unanswered Mergers and acquisitions are not uncommon in the tech industry, specifically in software. Even in...
Learn more
Executive View
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Learn more
Event Recording
Event Recording
Paul Simmonds: Why Your Business Needs a Strategic Approach to PAM
Often missed as a niche part of IT, “admin” access is the holy grail for the bad-guys attacking your business. Thus, its crucial to understand why a strategic approach to PAM and...
Learn more
Managing Privileged Access in Complex IT Environments for Business Benefit
Blog
Managing Privileged Access in Complex IT Environments for Business Benefit
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials....
A New Pamocracy is Growing Inside Your Organization
Blog
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a...
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management)...
PAM in a Post-Pandemic Digital World
Blog
PAM in a Post-Pandemic Digital World
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Securing Industrial Control Systems (ICS)
Blog
Securing Industrial Control Systems (ICS)
Cybersecurity has become essential for every modern business, but has historically focused on securing information technology (IT) used by the administrative side of the business, rather than...
Privileged Access Management
Blog
Privileged Access Management
Credential theft is the most popular way cyber criminals use to access corporate environments, but real power comes from compromising privileged credentials, which is why Privileged Access...
Remote Working
Blog
Remote Working
In recent years remote working has become increasingly common to enable people to remain productive while away from the office. However, the Covid 19 pandemic resulted in an almost overnight need...
EIC Speaker Spotlight: Chris Owen on Identity Management
Blog
EIC Speaker Spotlight: Chris Owen on Identity Management
Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC...
PAM Is Changing and You Need to Know Why
Blog
PAM Is Changing and You Need to Know Why
What is left to say about PAM that has not already been said? Well in my opinion, quite a lot – as I hope you find out when you join me at the forthcoming KCLive Event, Operationalizing...
Centrify & Thycotic: Will 1+1 be 2? Or less? Or more?
Blog
Centrify & Thycotic: Will 1+1 be 2? Or less? Or more?
TPG Capital acquiring Thycotic in addition to Centrify, but leaving many questions unanswered Mergers and acquisitions are not uncommon in the tech industry, specifically in software. Even in...
10 Use Cases for Universal Privilege Management
Blog
10 Use Cases for Universal Privilege Management
Even before COVID-19 entered our lexicon, privileged access management (PAM) was widely recognized as a foundational cybersecurity technology . In recent years, almost every cyberattack has...
1 2 Next