7 Vendors in the Gartner Peer Insights for Privileged Access

7 Vendors in the Gartner Peer Insights for Privileged Access

Earlier this week, technology research firm Gartner released their Peer Insights Customers’ Choice for Privileged Access Management.

According to Gartner’s Peer Insights for Privileged Access, these solutions “help organizations provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access.”

Additionally, among the key capabilities Gartner highlighted in its report on the Customers’ Choice for Privileged Access Management, these solutions must:

  • Assist with the discovery of privileged accounts within enterprise systems.
  • Manage and randomize password vaults.
  • Control access to privileged accounts.

Gartner named 7 Vendors in their Peer Insights Customers’ Choice for Privileged Access Management report:

  • BeyondTrust
  • Centrify
  • CyberArk
  • Devolutions
  • ManageEngine
  • SecureLink
  • Thycotic

Gartner determined these 7 vendors with the feedback and ratings received from end-users who have purchased, deployed, and/or used their solutions. Also, the Peer Insights Customer Choice awards take into account both the number of reviews and overall user ratings in its methodology. Gartner itself does not directly condone any product or solutions provider.

The Context for the Peer Insights Customers’ Choice

Generally, modern enterprises have only begun to appreciate the importance of Privileged Access Management solutions in cybersecurity. Simultaneously, enterprises continue to display a worrying immaturity concerning the deployment of PAM solutions. In fact, a study by Centrify discovered 26% of U.S. respondents expressed uncertainty concerning the very definition of privileged access management.  

Meanwhile, 74% of respondents whose enterprise suffered a breach said it involved a privileged account. Indeed, the actual percentage may prove to be closer to 80%, according to Forrester Research.

Hopefully, the recent Gartner Privileged Access Management Magic Quadrant (the first of its kind) and this Peer Insights for Privileged Access report indicates a realization of the importance of this kind of identity security.

Certainly, enterprises must take threats to their superusers seriously if they aim to survive in the modern digital marketplace. Time is of the essence.

You can read the full report here.

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner