Leadership Compass: Privilege Management
Facebook Twitter LinkedIn

Leadership Compass: Privilege Management

Combined Session
Thursday, May 15, 2014 12:00—13:00
Location: AUDITORIUM

Securely Managing Privileged Users: Selecting the Solution that fits to your Needs

The KuppingerCole Leadership Compass provides a thorough and comprehensive analysis of the product offerings in a particular market segment. KuppingerCole compares these offerings based and identifies the overall leaders, product leaders, market leaders, and innovation leaders. Furthermore, KuppingerCole provides in-depth analysis per product and additional analytics that show the strengths of products for various customer challenges. KuppingerCole Leadership Compass documents help customers in finding their path through the markets and identifying the products they should put on their shortlists. In this session, Martin Kuppinger and Rob Newby will provide an overview of the Privilege Management market based on the current KuppingerCole Leadership Compass.

This Leadership Compass session will providean overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc1. Technologies typically support Privilege Management as a password vault approach, with some form of proxy/gateway to record RDP Sessions, while logging key strokes for SSH based connections. This approach is regarded as standard, but we are now seeing many vendors being more innovative due to the migration towards the new platforms (Cloud, Mobile, Social) which requires privilege management for many more environments.

The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start with implementing a standard infrastructure for Privilege Management. This KuppingerCole Leadership Compass provides an overview of the leading vendors in that market segment.

Besides the established vendors providing complete Privilege Management product portfolios, there are some smaller vendors with interesting offerings as well as specialists focusing purely on individual parts of the Privilege Management market. 

Securely Managing Privileged Users: Selecting the Solution that fits to your Needs
Presentation deck
Securely Managing Privileged Users: Selecting the Solution that fits to your Needs
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Rob Newby
Rob Newby
KuppingerCole
Rob Newby studied Physics at the University of Bath, UK, before graduating and choosing a career in Security and Risk Management. He is now a governance, risk and compliance specialist with a...

Privileged Account Analytics in the Context of Realtime Analytics - Challenges and Benefits

In this discussion between Roy Adar and Martin Kuppinger, we will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these can be an important element in security strategies. We will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.

Roy Adar
Roy Adar
CyberArk
Roy Adar is the Vice President of Product Management at CyberArk Software. In his role he is responsible for CyberArk's product management, product marketing and overall product strategy. Adar...
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Subscribe for updates
Please provide your email address