KuppingerCole Report
Executive View
By Martin Smith

Micro Focus Privileged Account Manager

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager.
By Martin Smith
ms@kuppingercole.com

1 Introduction

In the age of digital transformation, the requirements for IT, but also the ways IT is done, are changing. Organizations need to reinvent themselves a ...

Login Free 30-day Select Access Get full Access

2 Product Description

Micro Focus IAM products are rooted in Novell and NetIQ technology acquired with Attachmate in 2014 and still sold under the NetIQ brand. NetIQ’s ex ...

NetIQ’s Privilege Management strategy is built around centralization. High-privilege credentials are kept in encrypted form in a secure vault, whic ...

Login Free 30-day Select Access Get full Access

2.1 Shared Account and Privileged Password Management

As mentioned above, centralized and secure storage of privileged credentials is the basis for NetIQ PAM’s architecture. Privileged credentials may o ...

Login Free 30-day Select Access Get full Access

2.2 Privileged Single Sign-On (SSO access to multiple privileged sessions)

Authorized NetIQ PAM users may leverage single sign-on to a Linux or UNIX server with elevated privileges directly from the browser-based NetIQ PAM Us ...

Login Free 30-day Select Access Get full Access

2.3 Privileged Account Discovery and Lifecycle Management

PAM Sniffer was released with NetIQ PAM version 3.2 (June 2017.) PAM Sniffer is an independent tool that can be run on any machine to discover the pri ...

Login Free 30-day Select Access Get full Access

2.4 Session Monitoring, Analysis and Recording

NetIQ PAM logs all use of privileged credentials in its centralized vault. It can capture commands issued in command-line and graphical UI, as well as ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

NetIQ PAM offers the standard capabilities associated with traditional Privilege Management, but the core product had been lacking some important adva ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top