Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Report Details

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren.

Cyber-Ark Priviliged Identity Manager (PIM) wird vom Hersteller als Suite bezeichnet, ist aber tatsächlich eher als integriertes Produkt zu sehen, dass weit über den konventionellen Suite-Ansatz hinaus geht und eine Reihe gemeinsamer Elemente und Merkmale miteinander verbindet. Cyber-Ark selbst beschreibt das als „Privileged Identity Management Infrastructure”. Aus Lizenzgründen zieht es der Hersteller vor, von einer Suite zu sprechen, da dies mehr Flexibilität in der Auswahl einzelner Produktkomponenten verspricht. Angesichts der Herausforderung, die PxM für Anwenderunternehmen darstellt, dürfte es jedoch in den meisten Fällen ratsam sein, die gesamte Suite mit allen Features zu implementieren.

Cyber-Ark PIM Suite zählt zu den führenden Produkten in dem noch jungen PxM-Markt. Es bietet eines der vollständigsten Funktionsumfänge aller Produkte im Markt. Die durchdachte Architektur ist hochskalierbar und einfach zu bedienen. Eine der größten Stärken des Produkts ist die umfangreiche Plattform-Unterstützung, die so gut wie alle Kernbereiche moderner IT-Umgebungen abdeckt.

Wir empfehlen deshalb, Cyber-Ark Privileged Identity Management Suite bei der Evaluierung von PxM-Produkten für komplexe, heterogene Umgebungen zu berücksichtigen.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 25, 2011

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte…

€95.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Advisory Note

Architecture Blueprint: Access Governance and Privilege Management - 79045

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and…

Executive View

Executive View: ARCON Privilege Manager - 70950

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support…

Executive View

Executive View: Micro Focus Privileged Account Manager - 71314

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ…

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix &…

Executive View

Executive View: Osirium: Privileged Access Management - 70836

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes…

Executive View

Executive View: Thycotic Privilege Manager - 70221

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus…

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides…

Executive View

Executive View: ManageEngine Password Manager Pro - 70613

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management,…

Executive View

Executive View: BeyondTrust PowerBroker PAM - 70725

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Whitepaper

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

"Archive != Delete": bring back the delete button

Why does it seem to be getting harder to delete information online? GDPR will take effect in just a few days. GDPR empowers EU people to take control of their personal information. When in force, GDPR will mandate that companies and other organizations which control or process personal information [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00