Advisory Note: Privilege Management - 70736

Report Details

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while acquisitions have also led to vendors providing broader offerings, moving from niche players to market leaders.

The reason for that growth is the increasing demand in the market. PxM is on its way out as a niche market and becoming a mandatory element of every Information Security and IAM (Identity and Access Management) infrastructure.

When looking at many of the large information security incidents which have become well-known during the past few years, it becomes obvious that many of them are related to privileged user accounts. Data theft on a large scale is most likely caused by users with elevated rights, typically administrative users. Thus it comes as no surprise that PxM is not only a topic which CIOs and CISOs have to look at but which auditors and regulators also have on their agenda. Compared with other types of IT technologies, the risk mitigation impacts of PxM as well as the audit relevance are exceptionally high...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Apr 09, 2013

Advisory Note: Privilege Management - 70736

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years,…

€495.00 Get access

Latest Related Reports

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Leadership Brief

Leadership Brief: The 5 Biggest IAM Myths - 72001

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

Executive View

Executive View: CyberArk Privileged Threat Analytics - 71540

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now…

Executive View

Executive View: BeyondTrust PowerBroker - 71504

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Executive View

Executive View: Balabit Shell Control Box - 71570

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Executive View

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Complexity Kills Agility: Why the German Reference Architecture Model for Industry 4.0 Will Fail

The German ZVEI (Zentralverband Elektrotechnik- und Elektroindustrie), the association of the electrical and electronic industries, and the VDI (Verein Deutscher Ingenieure), the association of German engineers, has published a concept called RAMI (Referenzarchitekturmodell Industrie 4.0). This [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Internet of Things & Industry 4.0

Internet of Things the intelligent connectivity of smart devices by which objects can sense one another and communicate, thus changing how where and by whom decisions about our physical world are made. Manufacturing companies are currently implementing this “intelligent connectivity of smart devices” in their factories and on the shop floor. To distinguish these applications of the IoT from those among consumers and other realms, the term Industrial Internet of Things is often used. (...)

Become a Client

Learn more about becoming a Client

Contact Us

Call Sales-Team

+49 211 2370770
Mo - Fr 8:00 - 17:00