Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Report Details

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren.

Cyber-Ark Priviliged Identity Manager (PIM) wird vom Hersteller als Suite bezeichnet, ist aber tatsächlich eher als integriertes Produkt zu sehen, dass weit über den konventionellen Suite-Ansatz hinaus geht und eine Reihe gemeinsamer Elemente und Merkmale miteinander verbindet. Cyber-Ark selbst beschreibt das als „Privileged Identity Management Infrastructure”. Aus Lizenzgründen zieht es der Hersteller vor, von einer Suite zu sprechen, da dies mehr Flexibilität in der Auswahl einzelner Produktkomponenten verspricht. Angesichts der Herausforderung, die PxM für Anwenderunternehmen darstellt, dürfte es jedoch in den meisten Fällen ratsam sein, die gesamte Suite mit allen Features zu implementieren.

Cyber-Ark PIM Suite zählt zu den führenden Produkten in dem noch jungen PxM-Markt. Es bietet eines der vollständigsten Funktionsumfänge aller Produkte im Markt. Die durchdachte Architektur ist hochskalierbar und einfach zu bedienen. Eine der größten Stärken des Produkts ist die umfangreiche Plattform-Unterstützung, die so gut wie alle Kernbereiche moderner IT-Umgebungen abdeckt.

Wir empfehlen deshalb, Cyber-Ark Privileged Identity Management Suite bei der Evaluierung von PxM-Produkten für komplexe, heterogene Umgebungen zu berücksichtigen.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 25, 2011

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte…

€95.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Leadership Compass

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege…

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their…

Executive View

Executive View: Centrify Privilege Service - 71326

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

Executive View

Executive View: IBM Privileged Identity Manager - 71557

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its…

Executive View

Executive View: Bomgar Privileged Access Management - 71307

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise…

Executive View

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged…

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Executive View

Executive View: CyberArk Privileged Threat Analytics - 71540

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00