Earlier this week, technology research firm Gartner released their Peer Insights Customers’ Choice for Privileged Access Management.
According to Gartner’s Peer Insights for Privileged Access, these solutions “help organizations provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access.”
Additionally, among the key capabilities Gartner highlighted in its report on the Customers’ Choice for Privileged Access Management, these solutions must:
- Assist with the discovery of privileged accounts within enterprise systems.
- Manage and randomize password vaults.
- Control access to privileged accounts.
Gartner named 7 Vendors in their Peer Insights Customers’ Choice for Privileged Access Management report:
Gartner determined these 7 vendors with the feedback and ratings received from end-users who have purchased, deployed, and/or used their solutions. Also, the Peer Insights Customer Choice awards take into account both the number of reviews and overall user ratings in its methodology. Gartner itself does not directly condone any product or solutions provider.
The Context for the Peer Insights Customers’ Choice
Generally, modern enterprises have only begun to appreciate the importance of Privileged Access Management solutions in cybersecurity. Simultaneously, enterprises continue to display a worrying immaturity concerning the deployment of PAM solutions. In fact, a study by Centrify discovered 26% of U.S. respondents expressed uncertainty concerning the very definition of privileged access management.
Meanwhile, 74% of respondents whose enterprise suffered a breach said it involved a privileged account. Indeed, the actual percentage may prove to be closer to 80%, according to Forrester Research.
Hopefully, the recent Gartner Privileged Access Management Magic Quadrant (the first of its kind) and this Peer Insights for Privileged Access report indicates a realization of the importance of this kind of identity security.
Certainly, enterprises must take threats to their superusers seriously if they aim to survive in the modern digital marketplace. Time is of the essence.
You can read the full report here.
Latest posts by Ben Canner (see all)
- Top Ten Books for Identity Management Professionals - September 16, 2020
- Is The Digital Perimeter Really Disappearing? Rethinking the IT Borders - September 14, 2020
- Why Machine Identity Management Matters Now More Than Ever - September 10, 2020