Vendor Report: Cyber-Ark
Its flagship product is the Cyber-Ark Privileged Identity Management (PIM) Suite. The terms PIM, PAM and PUM (Privileged User Management) are often used synonymously, but KuppingerCole prefers the PAM designation. Whatever name is used, this is definitely one of the fastest growing markets in IT today since data leakage and other security issues associated with privileged user accounts are an increasing concern for most companies and organizations. Cyber-Ark enjoys a substantial lead in this market. While small functional weaknesses do exist, they are more than compensated for by the product's broad range of features and good usability. Cyber-Ark Privileged Identity Management (PIM) should definitely be on the shortlist of products from this segment of the market under consideration for evaluation and purchase.
|Mar 30, 2010||
Vendor Report: Cyber-Ark
Cyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In addition, Cyber-Ark is active in the field of secure file transfer for secure document handling. The…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being tightened. The aim is to better protect the customers of e-commerce services. This sounds like a good development for us all, since we are all regular customers of online merchants or providers of online services. And if you look at the details of SCA, this impression is further enhanced. Logins [...]
AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]