KuppingerCole Report
Leadership Compass
By Paul Fisher

Privileged Access Management

Privileged Access Management (PAM) is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer only for protecting admin accounts, privilege management now extends across the entire organization -from on-premises and cloud infrastructures to every user, no matter where they are working from, or what they are accessing.
By Paul Fisher
pf@kuppingercole.com

1 Introduction

This report is an overview of the market for Privilege Access Management (PAM) platforms and provides a compass to help buyers find the product that best meets their needs. KuppingerCole examines the market segment, vendor capabilities, relative market share, and innovative approaches to providing PAM solutions.

1.1 Highlights

  • In depth ratings and reviews of 26 leading PAM products, fully updated for 2021

  • PAM vendors have responded well to the privilege remote acce ...

Login Get full Access

1.2 Market Segment

Privileged Access Management (PAM) platforms are critical cybersecurity controls that address the security risks associated with privileged access in ...

Trends in the market

In the past 12 months we have seen some changes in the vendor landscape with mergers and acquisitions affecting some of the big ...

Login Get full Access

1.3 Delivery Models

This Leadership Compass is focused on PAM products that are offered in on-premises deployable form as an appliance or virtual appliance, in the cloud ...

Login Get full Access

1.4 Required Capabilities

In this Leadership Compass, we focus on solutions that help organizations reduce the risks associated with privileged access, through individual or sh ...

Login Get full Access

1.4.1 Classical PAM capabilities

While the market continues to offer more capabilities to PAM platforms to meet the privileged access demands of large and more complex organizations, ...

Login Get full Access

1.4.2 Desired capabilities in addition to the classical components

As demands develop across the market, the choice for PAM has become wider but also more fragmented with the result that one solution may not fulfil al ...

Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Compass. The Compass provides a compa ...

Login Get full Access

2.1 Overall Leadership

When looking at the Leader segment in the Overall Leadership rating we can see that the number of overall vendors remains high at 26, with a couple of ...

Login Get full Access

2.2 Product Leadership

Product Leadership is the first specific category examined below. This view is mainly based on the analysis of service features and the overall capabi ...

As mentioned in Chapter 2, Required Capabilities, the PAM market is still made up of a heterogenous mix of vendors that offer different capability l ...

Login Get full Access

2.3 Innovation Leadership

Next, we examine innovation in the marketplace. Innovation is, from our perspective, a key capability in all IT market segments. Customers require i ...

Innovation has been relatively strong in the PAM market in the last two years with vendors large and small adding to capabilities and making use of AI ...

Login Get full Access

2.4 Market Leadership

Lastly, we analyze Market Leadership. This is an amalgamation of the number of customers, number of transactions evaluated, ratio between customers ...

There are no real surprises when it comes to Market Leadership with vendors with the largest customer base and market reach dominating the top right o ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...

Login Get full Access

3.1 The Market/Product Matrix

Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of "overperfor ...

Login Get full Access

3.2 The Product/Innovation Matrix

This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...

Innovation is important in this market given its core role in reducing the risk involved in matching identities to tasks. The Leaders are no real surp ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line are performing well in the market as well as showing Innovation Leadership; while vendors below the line show an ability to inn ...

Login Get full Access

4 Products and Vendors at a Glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on PAM. Aside from the rating ...

Login Get full Access

Table 1: Comparative overview of the ratings for the product capabilities.

In addition, we provide in Table 2 an overview which also contains four a ...

Login Get full Access

Table 2: Comparative overview of the ratings for vendors

Login Get full Access

5 Product/Vendor evaluation

This section contains a quick rating for every product/service we've included in this KuppingerCole Leadership Compass document. For many of the produ ...

Login Get full Access

5.1 ARCON

Founded in 2006 and based in Mumbai (India), ARCON offers its Privilege Account Management Suite to manage privileged access across various delivery m ...

Login Get full Access

5.2 BeyondTrust

BeyondTrust has continued to refine its portfolio of PAM products which now includes the Password Safe and DevOps Secrets Safe products, Endpoint Priv ...

Login Get full Access

5.3 Broadcom Inc.

Broadcom has now rationalized all its identity products into the Identity Management Security Division of Broadcom Software, including this PAM platfo ...

Login Get full Access

5.4 Centrify

Based in the US, Centrify offers several PAM modules as part of an overall suite which includes credential and secrets vaulting, privilege access, aut ...

Login Get full Access

5.5 CyberArk

Headquartered in Israel and the US, CyberArk is a highly mature PAM provider having been in the market since 1999. It has continued to add technical f ...

Login Get full Access

5.6 Devolutions

Founded in 2010, Canadian firm Devolutions started with its Remote Desktop Manager aimed at SMBs. It has since added PAM solutions to its portfolio wi ...

Login Get full Access

5.7 Ekran

New to the KuppingerCole PAM Leadership Compass this year is Ekran System. Founded in 2013 and based in Newport Beach, California it specializes in Us ...

Login Get full Access

5.8 EmpowerID

Based in Ohio (US), EmpowerID offers several products within its broader IAM portfolio, of which EmpowerID Privileged Access Management (PAM) is targe ...

Login Get full Access

5.9 Fudo Security

FUDO Security, with offices in California and Poland was founded in 2004. It offers FUDO PAM as its primary PAM product in the market. FUDO Security i ...

Login Get full Access

5.10 Heimdal Security

Heimdal is a security vendor based in Copenhagen, Denmark. It sells various security software products including a stripped-down PAM tool which focuse ...

Login Get full Access

5.11 Hitachi ID Systems

Hitachi ID, headquartered in Canada, is a global IAM software provider that originated as MTech Information Technology and acquired by Hitachi in 2008 ...

Login Get full Access

5.12 Indeed Identity

Indeed Identity is a Lithuanian IAM vendor founded in 2011. It has now branched out into PAM, reflecting a recent trend in the industry of IAM and PAM ...

Login Get full Access

5.13 Krontech

Based in Turkey, Krontech is the technology arm of Kron, a telco firm publicly listed on the Istanbul stock exchange. Krontech offers its Ironsphere P ...

Login Get full Access

5.14 ManageEngine

Headquartered in Pleasanton, US, ManageEngine is a part of the India-based Zoho Corporation founded in 1996. PAM360 is the company's main modular offe ...

Login Get full Access

5.15 Micro Focus

UK based software vendor Micro Focus, founded in 1976, has many solutions for organizations looking to transform operations and infrastructures. It ma ...

Login Get full Access

5.16 One Identity

California-based One Identity, a Quest Software business, specializes in IAM solutions and offers a range of products that fulfill the fundamentals of ...

Login Get full Access

5.17 Remediant

Based in San Francisco, Remediant is a single product PAM company founded in 2013. Its SecureONE product uses agent-less and vault-less technology at ...

Login Get full Access

5.18 Saviynt

Saviynt is a US based company founded in 2010 that specializes in IGA and Identity solutions. It fairly recently entered the PAM market with a new as- ...

Login Get full Access

5.19 Sectona

Founded in 2017, Mumbai (India) based Sectona is one of the newest PAM market entrants and offers four modules that cover fundamental PAM, Endpoint Pr ...

Login Get full Access

5.20 Senhasegura

Based in São Paulo, Brazil, MT4 Tecnologia produces Senhasegura as its flagship PAM product. Comprised of multiple modules, Senhasegura offers compre ...

Login Get full Access

5.21 SSH Communications Security

Based in Helsinki, Finland, SSH.COM offers PrivX as its primary product for the PAM market. PrivX offers an alternative to traditional account & passw ...

Login Get full Access

5.22 STEALTHbits Technologies

Founded 2002, Stealthbits is a US based company that offers several solutions designed to help organizations meet their GRC obligations. Part of this ...

Login Get full Access

5.23 Systancia

France based Systancia has several workplace and application virtualization tools. As part of this it offers the Cleanroom platform, which it develope ...

Login Get full Access

5.24 Thycotic

Based in Washington D.C. (US), Thycotic offers Secret Server as its primary Password Management product and Privilege Manager for Endpoint Privilege M ...

Login Get full Access

5.25 WALLIX

Based in France, WALLIX provides WALLIX Bastion as its primary PAM product in the market. At the core of Bastion is password management, session manag ...

Login Get full Access

5.26 Xton Technologies

Founded in 2017 and based in the US, Xton Technologies offers its Xton Access Manager (XTAM) platform to enterprise customers with a strong emphasis o ...

Login Get full Access

6 Vendors to Watch

Login Get full Access

6.1 Deep Identity

Based in Singapore, Deep Identity is a regional provider of Identity Management software, offering Deep PIM as its primary PAM product which is essent ...

Login Get full Access

6.2 HashiCorp

San Francisco (US) based HashiCorp is a provider of application development and delivery management software for datacentres. Built on an open-source ...

Login Get full Access

6.3 Identity Automation

Houston (US) based Identity Automation is an IAM solution provider that offers RapidIdentity Privileged Access Management as its PAM product in the ma ...

Login Get full Access

6.4 IRaje

India based IRaje offers Privileged Identity Manager (PIM) as a complete PAM solution with a compelling feature set and the flexibility to customize a ...

Login Get full Access

6.5 NRI Secure Technologies

Japan based NRI Secure Technologies offers SecureCube Access Check primarily providing Privileged Session Management (PSM) capabilities. Operating in ...

Login Get full Access

6.6 ObserveIT

ObserveIT provides a comprehensive agent based Session Management platform that is deployable and scalable across a variety of IT systems. ObserveIT i ...

Login Get full Access

6.7 Venafi

US based Venafi offers TrustAuthority, a machine identity protection platform that also offers extensive SSH key management for securing privileged ac ...

Login Get full Access

Methodology

Copyright

©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksÔ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top