The KuppingerCole Leadership Compass provides a thorough and comprehensive analysis of the product offerings in a particular market segment. KuppingerCole compares these offerings based and identifies the overall leaders, product leaders, market leaders, and innovation leaders. Furthermore, KuppingerCole provides in-depth analysis per product and additional analytics that show the strengths of products for various customer challenges. KuppingerCole Leadership Compass documents help customers in finding their path through the markets and identifying the products they should put on their shortlists. In this session, Martin Kuppinger and Rob Newby will provide an overview of the Privilege Management market based on the current KuppingerCole Leadership Compass.
This Leadership Compass session will providean overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc1. Technologies typically support Privilege Management as a password vault approach, with some form of proxy/gateway to record RDP Sessions, while logging key strokes for SSH based connections. This approach is regarded as standard, but we are now seeing many vendors being more innovative due to the migration towards the new platforms (Cloud, Mobile, Social) which requires privilege management for many more environments.
The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start with implementing a standard infrastructure for Privilege Management. This KuppingerCole Leadership Compass provides an overview of the leading vendors in that market segment.
Besides the established vendors providing complete Privilege Management product portfolios, there are some smaller vendors with interesting offerings as well as specialists focusing purely on individual parts of the Privilege Management market.
In this discussion between Roy Adar and Martin Kuppinger, we will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these can be an important element in security strategies. We will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.