Vendor Report: Cyber-Ark
Its flagship product is the Cyber-Ark Privileged Identity Management (PIM) Suite. The terms PIM, PAM and PUM (Privileged User Management) are often used synonymously, but KuppingerCole prefers the PAM designation. Whatever name is used, this is definitely one of the fastest growing markets in IT today since data leakage and other security issues associated with privileged user accounts are an increasing concern for most companies and organizations. Cyber-Ark enjoys a substantial lead in this market. While small functional weaknesses do exist, they are more than compensated for by the product's broad range of features and good usability. Cyber-Ark Privileged Identity Management (PIM) should definitely be on the shortlist of products from this segment of the market under consideration for evaluation and purchase.
|Mar 30, 2010||
Vendor Report: Cyber-Ark
Cyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In addition, Cyber-Ark is active in the field of secure file transfer for secure document handling. The…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Microservice-based architectures allow businesses to develop and deploy their applications in a much more flexible, scalable and convenient way – across multiple programming languages, frameworks and IT environments. Like with any other new technology that DevOps and security teams started to explore in the recent years, there is still quite a lot of confusion about the capabilities of new platforms, misconceptions about new attack vectors and renewed discussions about balancing security [...]
AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]