
Identity at the Center Identity At The Center #46 – The 2020 KuppingerCole Leadership Compass for Privileged Access Management
Jun 1, 2020
Dive into the latest trends in Privileged Access Management (PAM) with insights on market growth driven by cloud and compliance needs. Explore the nuances of vendor messaging that often masks true capabilities. Jim and Jeff break down essential PAM functionalities, from managing privileged account lifecycles to implementing just-in-time access. They also highlight behavior analytics for risk detection and the competitive landscape, showcasing leaders like CyberArk while comparing strengths of others. Discover the key to choosing the right PAM solution tailored to your needs!
AI Snips
Chapters
Transcript
Episode notes
Convergence Drives PAM Market Growth
- PAM market growth is driven by cloud, DevOps, compliance, and distributed work demands.
- Vendors from IGA, SSO, and PAM are converging to address expanding privileged needs.
Vaulting Is The Core PAM Pattern
- Core traditional PAM prevents humans from knowing privileged passwords by vaulting and rotating credentials.
- Session launch and recording preserve operation ability while keeping passwords hidden.
Don't Equate Provisioning With Governance
- Treat provisioning as only one slice of identity governance and capture a single view of who has access to what.
- Layer access reviews, role design, and request workflows on top rather than calling provisioning 'governance.'
