Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Report Details

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment.

Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several common elements and different feature sets, going beyond the typical suite approach. Cyber-Ark itself names the common elements as “Privileged Identity Management Infrastructure”. Defining the product as a suite however fits to the licensing approach which allows for selecting the required elements – even while, when looking at the PxM challenge, implementing the entire suite with all features typically is the best approach.

Cyber-Ark PIM suite is amongst the leading-edge products in the emerging PxM market, provide one of the most comprehensive feature sets in the entire markets. The well-thought architecture allows for scalability as well as ease-of-use. A particular strength of the product is the platform support which covers virtually all core systems in today’s IT environments.

Thus we strongly recommend to include the Cyber-Ark Privileged Identity Management Suite in evaluations for PxM tools – even more in complex, heterogeneous enterprise environments.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Dec 22, 2010

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM…

€95.00 Get Access

Latest Related Reports

Executive View

Executive View: Centrify Privilege Service - 71326

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

Executive View

Executive View: IBM Privileged Identity Manager - 71557

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its…

Executive View

Executive View: Bomgar Privileged Access Management - 71307

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise…

Executive View

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged…

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Executive View

Executive View: CyberArk Privileged Threat Analytics - 71540

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now…

Executive View

Executive View: BeyondTrust PowerBroker - 71504

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Executive View

Executive View: Balabit Shell Control Box - 71570

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR and Customer Data - Eyes on the Stars and Feet on the Ground

Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's profiles. Many specialized vendors target these organisations. And it is obvious: The identification of [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Digital Finance

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a contractual [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00