Insights

Privileged Access Management

Privileged access management can become very complex if we let all the different technologies involved overwhelm us too soon.

But at its heart PAM has one simple task: to ensure that access to secrets is as secure as possible and only for those people authorised to see them.

Guide
Guide
Privileged Access Management: Nearly Everything You Need to Know to Get Started
Your guide to why Privileged Access matters to your business. Learn about the basics to get started with PAM.
Learn more
KC Open Select
KC Open Select
Privileged Access Management
Create a shortlist of solutions tailored to privileged access management your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Executive View
Executive View
Indeed Privileged Access Manager
Indeed Identity is an Identity & Access Management (IAM) vendor founded in 2011. In recent years it has expanded into the Privileged Access Management (PAM) market with an entry level platform that...
Learn more
Webinar Recording
Webinar Recording
Implementing Modern and Future-Proof PAM Solutions
Privilege Access Management (PAM) is changing, driven by the move of most businesses from on-prem IT applications and infrastructure to the cloud, resulting in a multi-could, multi-hybrid IT...
Learn more
Identity and Access Management Strategies That Grow With Your Business
Webinar Recording
Identity and Access Management Strategies That Grow With Your Business
For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality...
Remote Workforce: How to Protect Yourself From Emerging Threats?
Webinar Recording
Remote Workforce: How to Protect Yourself From Emerging Threats?
The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy....
Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation
Webinar Recording
Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation
What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the...
Analyst Chat #42: Ephemeral Credentials
Analyst Chat
Analyst Chat #42: Ephemeral Credentials
Alexei Balaganski and Matthias Reinwarth discuss the concept of ephemeral credentials and its benefits for privilege management, DevOps and beyond.
Four Key Components Critical to the Future of Privileged Access Management
Webinar Recording
Four Key Components Critical to the Future of Privileged Access Management
Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. But as companies...
Analyst Chat #26: Functionalities at the Core of a Privileged Account Management System
Analyst Chat
Analyst Chat #26: Functionalities at the Core of a Privileged Account Management System
Paul Fisher and Matthias Reinwarth continue talking about privileged access management, discussing the core capabilities of modern PAM solutions.
Minimizing Security Impacts of a Growing Remote Workforce
Webinar Recording
Minimizing Security Impacts of a Growing Remote Workforce
Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. However, an expanding remote workforce can...
The Future of Privileged Access Management and Reducing Risk for Modern Digital Enterprises
Webinar Recording
The Future of Privileged Access Management and Reducing Risk for Modern Digital Enterprises
While Privileged Access Management (PAM) must still fulfill its core function of protecting privileged accounts, the next generation of PAM solutions can do so much more for your organization. As...
Analyst Chat #20: PAM - What are Privileged Accounts
Analyst Chat
Analyst Chat #20: PAM - What are Privileged Accounts
Matthias Reinwarth and Paul Fisher launch a new series of talks about privileged access management.
6 Myths of Privileged Access Management Busted
Webinar Recording
6 Myths of Privileged Access Management Busted
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully...
Challenges for Managed Service Providers Offering Privileged Account Management as a Service
Webinar Recording
Challenges for Managed Service Providers Offering Privileged Account Management as a Service
Insufficiently protected privileged accounts pose high risks to any given company today. Therefore, Privileged Account Management (PAM) is of paramount importance to a functional insider threat...
The Compelling Need for Privileged IT Process Automation
Webinar Recording
The Compelling Need for Privileged IT Process Automation
IT processes can often be repetitive and many of these tasks can take companies a lot of time and costs, putting pressure on highly skilled IT staff. By automating IT processes, companies can not...