KuppingerCole Report
Executive View
By Anmol Singh

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and services. Privileged Session Manager for Cloud enables secured administrative access to a hybrid cloud environment combined with multi-factor authentication.

1 Introduction

Privileged Access Management (PAM), over the last few years, has become one of the most relevant areas of Cyber Security closely associated with Ident ...

Of the available Privileged Access Management (PAM) technologies, PSM remains one of the three core technologies that constitute a baseline PAM soluti ...

Login Free 30-day Select Access Get full Access

2 Product Description

Headquartered in Petach-Tikva, Israel, CyberArk offers a comprehensive range of PAM technologies that help organizations manage the most critical aspe ...

Login Free 30-day Select Access Get full Access

2.1 CyberArk Privileged Session Manager

This section describes the existing CyberArk Privileged Session Manager offering prior to the addition of Privileged Session Manager for Cloud.

Cyb ...

Login Free 30-day Select Access Get full Access

2.2 CyberArk Privileged Session Manager for Cloud

An increased use of cloud infrastructure and applications by organizations comes with an increased acceptance of and reliability on the cloud provider ...

Privileged session management technology is continuously evolving to address the emerging requirements of securing privileged access as businesses shi ...

Login Free 30-day Select Access Get full Access

2.3 CyberArk PAM for Cloud: Vision

CyberArk Privileged Session Manager for Cloud offers a good mix of session management capabilities developed internally by CyberArk and selectively ac ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

With CyberArk building on additional Privileged Session Manager capabilities to address emerging cloud access and security requirements of organizatio ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top