English   Deutsch   Русский   中文    

Leadership Compass: Privilege Management - 70960

Jan 22, 2014 by Peter Cummings

This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to record RDP Sessions, while logging key strokes for SSH based connections. This approach is regarded as standard, but we are now seeing many vendors being more innovative, on one hand due to the migration towards the new platforms (Cloud, Mobile, Social) which requires privilege management for many more environments, and on the other due to the emerging challenges regarding Privileged Access that require more than just managing passwords.

The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start with implementing a standard infrastructure for Privilege Management. This

Date Title Price
Jan 22, 2014
Leadership Compass: Privilege Management - 70960
This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly…
€1295.00 Get access 


Google+
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Adaptive Authentication & Authorization
It’s called “adaptive” because it adapts to the circumstances at the time of the authentication ceremony and dynamically adjusts both the authentication factors as well as the facet(s) of the factors chosen. This is all done as part of the risk analysis of what we call the Adaptive Policy-based Access Management (APAM) system.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole