Reports

Reload reports without any filters applied

Selected Filter(s):

  • Privileged Access Management

 All Reports
Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.

Leadership Compass

KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.

Product Report

KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.

Survey

KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.

Vendor Report

KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.

 2019

top  

Date Title Price
Nov 07, 2019

Whitepaper: Understanding Privileged Access Management - 80302

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more…

Jul 30, 2019

Executive View: Xton Technologies Access Manager - 80128

Martin Kuppinger

Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared account, session management and remote control access. Xton focuses on efficient implementation of these capabilities and is an interesting alternative to established players in the PAM market.

May 08, 2019

Executive View: Wallix Bastion - 79053

Anmol Singh

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale…

Nov 14, 2019

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Paul Fisher

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die…

free
Oct 30, 2019

Executive View: One Identity Safeguard Suite - 80074

Paul Fisher

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation. One Identity Safeguard Suite is a PAM solution that uses a modular approach across password management, session management and privilege account analytics.

Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

Oct 17, 2019

Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123

Paul Fisher

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no…

Oct 08, 2019

Executive View: Devolutions PAM Solution - 80070

Martin Kuppinger

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced capabilities of the leading-edge PAM solutions are lacking, the product fits well to the target group…

Sep 12, 2019

Leadership Brief: Top Cyber Threats - 72574

Christopher Schuetze

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them.

Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Aug 29, 2019

Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194

Matthias Reinwarth    Christopher Schuetze

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall oder ihre erhebliche Beeinträchtigung kann zu anhaltenden Versorgungsengpässen,…

Aug 29, 2019

Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065

Matthias Reinwarth    Christopher Schuetze

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic…

May 27, 2019

Executive View: Osirium Opus Privileged IT Process Automation - 79068

Martin Kuppinger

Osirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus allows for defining and managing granular tasks, that can be executed securely on the target systems. By doing so, the efficiency of service desks can increase significantly, while security risks are mitigated.

May 07, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für…

Apr 26, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security threats caused by  abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management…

Mar 25, 2019

Executive View: CyberArk Privileged Session Manager for Web - 79034

Anmol Singh

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and…

Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Anmol Singh

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a…

Mar 20, 2019

Executive View: Krontech SingleConnect - 80031

Anmol Singh

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges.

Mar 15, 2019

Executive View: Thycotic Privilege Manager - 80004

Anmol Singh

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a…

Mar 05, 2019

Whitepaper: PATECCO Privileged Access Management Services - 80037

Matthias Reinwarth

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation.

Feb 11, 2019

Executive View: Hitachi ID Privileged Access Manager - 80030

Martin Kuppinger

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists.

Jan 24, 2019

Executive View: SSH.COM PrivX - 70302

Martin Kuppinger

SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments.

 2018

top  

Date Title Price
Apr 19, 2018

Executive View: ARCON Privilege Manager - 70950

Anmol Singh

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support the scalability and complexity requirements of large data centre deployments.

Apr 18, 2018

Executive View: Micro Focus Privileged Account Manager - 71314

Martin Smith

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager.

Jan 12, 2018

Executive View: Osirium: Privileged Access Management - 70836

Martin Kuppinger

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications.

Jan 09, 2018

Executive View: Thycotic Privilege Manager - 70221

Martin Kuppinger

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users.

€190.00 *
Aug 23, 2018

Executive View: CA Privileged Access Management Suite - 79047

Anmol Singh

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control.

Aug 06, 2018

Executive View: StealthINTERCEPT® - 70367

Mike Small

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’…

May 16, 2018

Architecture Blueprint: Access Governance and Privilege Management - 79045

Matthias Reinwarth

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and privileged access. Thus, it substantially improves an organization's security posture.

Jan 17, 2018

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen.

 2017

top  

Date Title Price
Aug 21, 2017

Executive View: One Identity SafeGuard 2.0 - 71251

Martin Kuppinger

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities, and other features such as very strong workflow support.

€190.00 *
Aug 11, 2017

Executive View: Thycotic Secret Server - 71060

Martin Kuppinger

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set.

€190.00 *
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei…

€1295.00 *
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that…

€1295.00 *
Jan 18, 2017

Executive View: Centrify Privilege Service - 71326

John Tolbert

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

€190.00 *
Dec 28, 2017

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms.

Nov 07, 2017

Executive View: ManageEngine Password Manager Pro - 70613

Martin Kuppinger

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management, Application-to-Application Privilege Management, or Session Management. The tool counts among the advanced, feature-rich…

Nov 06, 2017

Executive View: BeyondTrust PowerBroker PAM - 70275

Martin Kuppinger

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker PAM delivers deep support for privilege management on…

Oct 24, 2017

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

Martin Kuppinger

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks remain at a high level – perimeter security in itself does not protect sufficiently anymore.…

 2016

top  

Date Title Price
Jan 29, 2016

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre Bedürfnisse optimal geeignetes Privilege Management-Produkt zu finden.

€1295.00 *
Jun 15, 2016

Executive View: Bomgar Privileged Access Management - 71307

Matthias Reinwarth

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise infrastructure like IAM, SIEM, ITSM and Change Management systems. 

€190.00 *
May 20, 2016

Executive View: CA Privileged Access Manager - 71264

Ivan Niccolai

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications. 

€190.00 *
May 03, 2016

Executive View: CyberArk Privileged Threat Analytics - 71540

Ivan Niccolai

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now provides real-time network threat detection and automated response capabilities. 

€190.00 *
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

Ivan Niccolai

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker provides deep support for privilege management on…

€190.00 *
Apr 28, 2016

Executive View: Balabit Shell Control Box - 71570

Alexei Balaganski

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change business processes.

€190.00 *
Feb 24, 2016

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Ivan Niccolai

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with privileged credential management. 

€190.00 *
Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

Ivan Niccolai

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its fine-grained database privilege management capabilities and well-designed administrator endpoint monitoring.

€190.00 *
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Alexei Balaganski

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged Activity Monitoring, and User Behavior Analytics into an integrated real-time security intelligence…

€190.00 *
May 23, 2016

Executive View: Omada Identity Suite v11.1 - 70835

Ivan Niccolai

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

€190.00 *
May 20, 2016

Executive View: Universal SSH Key Manager - 71509

Alexei Balaganski

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

€190.00 *

 2015

top  

Date Title Price
Dec 10, 2015

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.

€1295.00 *
Nov 12, 2015

Leadership Brief: Privileged Account Management Considerations - 72016

Mike Small

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

free
May 29, 2015

Executive View: Oracle Privileged Account Manager - 71057

Alexei Balaganski

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity Governance suite.

€190.00 *
Mar 19, 2015

Executive View: Wallix AdminBastion - 71266

Matthias Reinwarth

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing and recording, real-time supervision, analytics and scheduled reports.

€190.00 *
Mar 17, 2015

Executive View: CA Privileged Identity Manager - 71059

Alexei Balaganski

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

€190.00 *
Feb 13, 2015

Executive View: ARCOS Privileged Identity Management Suite - 71028

Alexei Balaganski

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products for automated risk control, real-time risk assessment and privileged identity management. ARCON…

€190.00 *
Jan 19, 2015

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in mehreren Ländern Europas, den Vereinigten Staaten und Russland sowie über ein großes…

€190.00 *
Sep 18, 2015

Executive View: BalaBit Blindspotter - 71202

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00 *
Aug 26, 2015

Executive View: BalaBit syslog-ng - 71201

Martin Kuppinger

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

€190.00 *
May 26, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es ermöglicht eine detaillierte Analyse des Nutzerverhaltens und das Eingreifen in Live-Sessions.

€190.00 *
Apr 30, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

€190.00 *
Apr 17, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und Active Directory.

€190.00 *
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

€190.00 *

 2014

top  

Date Title Price
Nov 06, 2014

Leadership Compass: IAM/IAG Suites - 71105

Martin Kuppinger

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management. Your compass for finding the right path in the market.

€1295.00 *
Jan 22, 2014

Leadership Compass: Privilege Management - 70960

Peter Cummings

This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to record RDP Sessions, while logging…

€1295.00 *
Nov 28, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren diese Technologien noch bis vor kurzem außerhalb von IT-Abteilungen nahezu unbekannt. Aber…

€190.00 *
Aug 18, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT departments. However, the ongoing trends in the IT industry have gradually shifted the focus of…

€190.00 *
Jul 24, 2014

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States and Russia and a large partner network. The company has won widespread recognition in the Open…

€190.00 *
Jun 04, 2014

Vendor Report: Thycotic - 71112

Martin Kuppinger

Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific administrative tasks. In contrast to several other vendors, all research, product…

€495.00 *

 2013

top  

Date Title Price
Apr 09, 2013

Advisory Note: Privilege Management - 70736

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while…

€495.00 *

 2012

top  

Date Title Price
Apr 13, 2012

Advisory Note: Privilege Management - 70177

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while acquisitions have also led to vendors with broader…

€495.00 *

 2011

top  

Date Title Price
Jan 25, 2011

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren. Cyber-Ark…

€95.00 *

 2010

top  

Date Title Price
Dec 22, 2010

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several…

€95.00 *
Sep 28, 2010

Product Report: CA Access Control – Privileged User and Password Management

Martin Kuppinger

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity Management, depending on the product specifics and the vendors marketing) within the IAM (Identity…

€95.00 *

 2018

top  

Date Title Price
May 16, 2018

Architecture Blueprint: Access Governance and Privilege Management - 79045

Matthias Reinwarth

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and privileged access. Thus, it substantially improves an organization's security posture.

 2013

top  

Date Title Price
Apr 09, 2013

Advisory Note: Privilege Management - 70736

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while…

€495.00 *

 2012

top  

Date Title Price
Apr 13, 2012

Advisory Note: Privilege Management - 70177

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while acquisitions have also led to vendors with broader…

€495.00 *

 2019

top  

Date Title Price
Jul 30, 2019

Executive View: Xton Technologies Access Manager - 80128

Martin Kuppinger

Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared account, session management and remote control access. Xton focuses on efficient implementation of these capabilities and is an interesting alternative to established players in the PAM market.

May 08, 2019

Executive View: Wallix Bastion - 79053

Anmol Singh

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale…

Oct 30, 2019

Executive View: One Identity Safeguard Suite - 80074

Paul Fisher

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation. One Identity Safeguard Suite is a PAM solution that uses a modular approach across password management, session management and privilege account analytics.

Oct 08, 2019

Executive View: Devolutions PAM Solution - 80070

Martin Kuppinger

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced capabilities of the leading-edge PAM solutions are lacking, the product fits well to the target group…

May 27, 2019

Executive View: Osirium Opus Privileged IT Process Automation - 79068

Martin Kuppinger

Osirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus allows for defining and managing granular tasks, that can be executed securely on the target systems. By doing so, the efficiency of service desks can increase significantly, while security risks are mitigated.

May 07, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für…

Apr 26, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security threats caused by  abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management…

Mar 25, 2019

Executive View: CyberArk Privileged Session Manager for Web - 79034

Anmol Singh

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and…

Mar 20, 2019

Executive View: Krontech SingleConnect - 80031

Anmol Singh

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges.

Mar 15, 2019

Executive View: Thycotic Privilege Manager - 80004

Anmol Singh

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a…

Feb 11, 2019

Executive View: Hitachi ID Privileged Access Manager - 80030

Martin Kuppinger

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists.

Jan 24, 2019

Executive View: SSH.COM PrivX - 70302

Martin Kuppinger

SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments.

 2018

top  

Date Title Price
Apr 19, 2018

Executive View: ARCON Privilege Manager - 70950

Anmol Singh

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support the scalability and complexity requirements of large data centre deployments.

Apr 18, 2018

Executive View: Micro Focus Privileged Account Manager - 71314

Martin Smith

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager.

Jan 12, 2018

Executive View: Osirium: Privileged Access Management - 70836

Martin Kuppinger

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications.

Jan 09, 2018

Executive View: Thycotic Privilege Manager - 70221

Martin Kuppinger

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users.

€190.00 *
Aug 23, 2018

Executive View: CA Privileged Access Management Suite - 79047

Anmol Singh

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control.

Aug 06, 2018

Executive View: StealthINTERCEPT® - 70367

Mike Small

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’…

Jan 17, 2018

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen.

 2017

top  

Date Title Price
Aug 21, 2017

Executive View: One Identity SafeGuard 2.0 - 71251

Martin Kuppinger

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities, and other features such as very strong workflow support.

€190.00 *
Aug 11, 2017

Executive View: Thycotic Secret Server - 71060

Martin Kuppinger

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set.

€190.00 *
Jan 18, 2017

Executive View: Centrify Privilege Service - 71326

John Tolbert

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

€190.00 *
Dec 28, 2017

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms.

Nov 07, 2017

Executive View: ManageEngine Password Manager Pro - 70613

Martin Kuppinger

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management, Application-to-Application Privilege Management, or Session Management. The tool counts among the advanced, feature-rich…

Nov 06, 2017

Executive View: BeyondTrust PowerBroker PAM - 70275

Martin Kuppinger

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker PAM delivers deep support for privilege management on…

 2016

top  

Date Title Price
Jun 15, 2016

Executive View: Bomgar Privileged Access Management - 71307

Matthias Reinwarth

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise infrastructure like IAM, SIEM, ITSM and Change Management systems. 

€190.00 *
May 20, 2016

Executive View: CA Privileged Access Manager - 71264

Ivan Niccolai

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications. 

€190.00 *
May 03, 2016

Executive View: CyberArk Privileged Threat Analytics - 71540

Ivan Niccolai

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now provides real-time network threat detection and automated response capabilities. 

€190.00 *
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

Ivan Niccolai

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker provides deep support for privilege management on…

€190.00 *
Apr 28, 2016

Executive View: Balabit Shell Control Box - 71570

Alexei Balaganski

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change business processes.

€190.00 *
Feb 24, 2016

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Ivan Niccolai

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with privileged credential management. 

€190.00 *
Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

Ivan Niccolai

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its fine-grained database privilege management capabilities and well-designed administrator endpoint monitoring.

€190.00 *
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Alexei Balaganski

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged Activity Monitoring, and User Behavior Analytics into an integrated real-time security intelligence…

€190.00 *
May 23, 2016

Executive View: Omada Identity Suite v11.1 - 70835

Ivan Niccolai

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

€190.00 *
May 20, 2016

Executive View: Universal SSH Key Manager - 71509

Alexei Balaganski

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

€190.00 *

 2015

top  

Date Title Price
May 29, 2015

Executive View: Oracle Privileged Account Manager - 71057

Alexei Balaganski

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity Governance suite.

€190.00 *
Mar 19, 2015

Executive View: Wallix AdminBastion - 71266

Matthias Reinwarth

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing and recording, real-time supervision, analytics and scheduled reports.

€190.00 *
Mar 17, 2015

Executive View: CA Privileged Identity Manager - 71059

Alexei Balaganski

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

€190.00 *
Feb 13, 2015

Executive View: ARCOS Privileged Identity Management Suite - 71028

Alexei Balaganski

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products for automated risk control, real-time risk assessment and privileged identity management. ARCON…

€190.00 *
Jan 19, 2015

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in mehreren Ländern Europas, den Vereinigten Staaten und Russland sowie über ein großes…

€190.00 *
Sep 18, 2015

Executive View: BalaBit Blindspotter - 71202

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00 *
Aug 26, 2015

Executive View: BalaBit syslog-ng - 71201

Martin Kuppinger

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

€190.00 *
May 26, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es ermöglicht eine detaillierte Analyse des Nutzerverhaltens und das Eingreifen in Live-Sessions.

€190.00 *
Apr 30, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

€190.00 *
Apr 17, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und Active Directory.

€190.00 *
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

€190.00 *

 2014

top  

Date Title Price
Nov 28, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren diese Technologien noch bis vor kurzem außerhalb von IT-Abteilungen nahezu unbekannt. Aber…

€190.00 *
Aug 18, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT departments. However, the ongoing trends in the IT industry have gradually shifted the focus of…

€190.00 *
Jul 24, 2014

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States and Russia and a large partner network. The company has won widespread recognition in the Open…

€190.00 *

 2019

top  

Date Title Price
Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

Sep 12, 2019

Leadership Brief: Top Cyber Threats - 72574

Christopher Schuetze

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them.

 2015

top  

Date Title Price
Nov 12, 2015

Leadership Brief: Privileged Account Management Considerations - 72016

Mike Small

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

free

 2019

top  

Date Title Price
Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Anmol Singh

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a…

 2017

top  

Date Title Price
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei…

€1295.00 *
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that…

€1295.00 *

 2016

top  

Date Title Price
Jan 29, 2016

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre Bedürfnisse optimal geeignetes Privilege Management-Produkt zu finden.

€1295.00 *

 2015

top  

Date Title Price
Dec 10, 2015

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.

€1295.00 *

 2014

top  

Date Title Price
Nov 06, 2014

Leadership Compass: IAM/IAG Suites - 71105

Martin Kuppinger

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management. Your compass for finding the right path in the market.

€1295.00 *
Jan 22, 2014

Leadership Compass: Privilege Management - 70960

Peter Cummings

This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to record RDP Sessions, while logging…

€1295.00 *

 2011

top  

Date Title Price
Jan 25, 2011

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren. Cyber-Ark…

€95.00 *

 2010

top  

Date Title Price
Dec 22, 2010

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several…

€95.00 *
Sep 28, 2010

Product Report: CA Access Control – Privileged User and Password Management

Martin Kuppinger

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity Management, depending on the product specifics and the vendors marketing) within the IAM (Identity…

€95.00 *

 2014

top  

Date Title Price
Jun 04, 2014

Vendor Report: Thycotic - 71112

Martin Kuppinger

Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific administrative tasks. In contrast to several other vendors, all research, product…

€495.00 *

 2019

top  

Date Title Price
Nov 07, 2019

Whitepaper: Understanding Privileged Access Management - 80302

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more…

Nov 14, 2019

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Paul Fisher

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die…

free
Oct 17, 2019

Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123

Paul Fisher

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no…

Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Aug 29, 2019

Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194

Matthias Reinwarth    Christopher Schuetze

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall oder ihre erhebliche Beeinträchtigung kann zu anhaltenden Versorgungsengpässen,…

Aug 29, 2019

Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065

Matthias Reinwarth    Christopher Schuetze

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic…

Mar 05, 2019

Whitepaper: PATECCO Privileged Access Management Services - 80037

Matthias Reinwarth

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation.

 2017

top  

Date Title Price
Oct 24, 2017

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

Martin Kuppinger

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks remain at a high level – perimeter security in itself does not protect sufficiently anymore.…

* All prices excl. VAT

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Renovate Your IAM-House While You Continue to Live in It

Do you belong to the group of people who would like to completely retire all obsolete solutions and replace existing solutions with new ones in a Big Bang? Do you do the same with company infrastructures? Then you don't need to read any further here. Please tell us later, how things worked out for you. Or do you belong in the other extreme to those companies in which infrastructures can be further developed only through current challenges, audit findings, or particularly prestigious projects [...]

Latest Insights

Hot Topics

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00