Insights

Privileged Access Management

Privileged access management can become very complex if we let all the different technologies involved overwhelm us too soon.

But at its heart PAM has one simple task: to ensure that access to secrets is as secure as possible and only for those people authorised to see them.

Guide
Guide
Privileged Access Management: Nearly Everything You Need to Know to Get Started
Your guide to why Privileged Access matters to your business. Learn about the basics to get started with PAM.
Learn more
KC Open Select
KC Open Select
Privileged Access Management
Create a shortlist of solutions tailored to privileged access management your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Blog
Blog
A New Pamocracy is Growing Inside Your Organization
OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT, to define Privileged Access Management. Here is what it said: “Privileged Access Management (PAM) is a...
Learn more
Leadership Compass
Leadership Compass
Secrets Management
Secrets Management is a broad subject that covers any protected data or information that must not be divulged to others. In this document the term ‘secret’ refers to a software token, a key pair or...
Learn more
Webinar Recording
Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of...
Learn more
The Battle of PAM Clients: 5 Benefits of Thin Clients
Blog
The Battle of PAM Clients: 5 Benefits of Thin Clients
Privileged Access Management (PAM) software comes in many forms. Some are heavy with software components (the thick client model) while others are leaner (the thin client model). Since we at...
The Latest Twitter “Hack” Raises Inconvenient Questions
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
What's the Next Generation in PAM?
Blog
What's the Next Generation in PAM?
Before there were PAM solutions everyone was given access to privileged accounts with little regard or control as to who had access to them, when they had access and what they did with that...
PAM Can Reduce Risk of Compliance Failure but Is Part of a Bigger Picture
Blog
PAM Can Reduce Risk of Compliance Failure but Is Part of a Bigger Picture
The importance of privilege accounts to digital organizations and their appeal to cyber attackers has made Privilege Access Management (PAM) an essential component of an identity and access...
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Blog
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Much is written about the growth of AI in the enterprise and how, as part of digital transformation, it will enable companies to create value and innovate faster. At the same time, cybersecurity...
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
BOMGAR acquires Avecto to expand its PAM portfolio
Blog
BOMGAR acquires Avecto to expand its PAM portfolio
BOMGAR , owned by PE firm Francisco Partners has recently announced that it has acquired Avecto , a UK based Endpoint Privilege Management (EPM) company. The move coming within 6 months of...
Thycotic acquires Arellia – moving beyond pure Privilege Management
Blog
Thycotic acquires Arellia – moving beyond pure Privilege Management
On February 23 rd , 2016, Thycotic, one of the leading vendors in the area of Privilege Management (also commonly referred to as Privileged Account Management or Privileged Identity Management)...
User views on Privilege Management
Blog
User views on Privilege Management
Last December (“ Quo Vadis? ”) I advocated using Privilege Management solutions for all users. As Martin Kuppinger defined it in his advisory note last April: “Privilege Management, which in...