Content of Figures
- Figure 1 Projected market growth of global PAM market by 2023 (KuppingerCole)
- Figure 2 The core capabilities of PAM should provide secure access for all digital identities and locations (Source: KuppingerCole).
- Figure 3 The three classical PAM capabilities can cover most core business IT use cases.
- Figure 4 Optional PAM capabilities and the business IT use cases they can assist with.
- Figure 5 The Overall Leaders in Privileged Access Management.
- Figure 6 The Product Leaders in Privileged Access Management.
- Figure 7 The Innovation Leaders in Privileged Access Management.
- Figure 8 The Market Leaders in Privileged Access Management
- Figure 9 The Market/Product Matrix for Privileged Access Management.
- Figure 10 The Product/Innovation Matrix for Privileged Access Management.
- Figure 11 The Innovation/Matrix for Privileged Access Management.
This report is an overview of the market for Privilege Access Management (PAM) platforms and provides a compass to help buyers find the product that b ...Login Get full Access
In depth ratings and reviews of 26 leading PAM products, fully updated for 2021
PAM vendors have responded well to the privilege remote acce ...
1.2 Market Segment
Privileged Access Management (PAM) platforms are critical cybersecurity controls that address the security risks associated with privileged access in ...
Trends in the market
In the past 12 months we have seen some changes in the vendor landscape with mergers and acquisitions affecting some of the big ...Login Get full Access
1.3 Delivery Models
This Leadership Compass is focused on PAM products that are offered in on-premises deployable form as an appliance or virtual appliance, in the cloud ...Login Get full Access
1.4 Required Capabilities
In this Leadership Compass, we focus on solutions that help organizations reduce the risks associated with privileged access, through individual or sh ...Login Get full Access
1.4.1 Classical PAM capabilities
While the market continues to offer more capabilities to PAM platforms to meet the privileged access demands of large and more complex organizations, ...Login Get full Access
1.4.2 Desired capabilities in addition to the classical components
As demands develop across the market, the choice for PAM has become wider but also more fragmented with the result that one solution may not fulfil al ...Login Get full Access
Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Compass. The Compass provides a compa ...Login Get full Access
2.1 Overall Leadership
When looking at the Leader segment in the Overall Leadership rating we can see that the number of overall vendors remains high at 26, with a couple of ...Login Get full Access
2.2 Product Leadership
Product Leadership is the first specific category examined below. This view is mainly based on the analysis of service features and the overall capabi ...
As mentioned in Chapter 2, Required Capabilities, the PAM market is still made up of a heterogenous mix of vendors that offer different capability l ...Login Get full Access
2.3 Innovation Leadership
Next, we examine innovation in the marketplace. Innovation is, from our perspective, a key capability in all IT market segments. Customers require i ...
Innovation has been relatively strong in the PAM market in the last two years with vendors large and small adding to capabilities and making use of AI ...Login Get full Access
2.4 Market Leadership
Lastly, we analyze Market Leadership. This is an amalgamation of the number of customers, number of transactions evaluated, ratio between customers ...
There are no real surprises when it comes to Market Leadership with vendors with the largest customer base and market reach dominating the top right o ...Login Get full Access
3 Correlated View
While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...Login Get full Access
3.1 The Market/Product Matrix
Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of "overperfor ...Login Get full Access
3.2 The Product/Innovation Matrix
This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...
Innovation is important in this market given its core role in reducing the risk involved in matching identities to tasks. The Leaders are no real surp ...Login Get full Access
3.3 The Innovation/Market Matrix
The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...
Vendors above the line are performing well in the market as well as showing Innovation Leadership; while vendors below the line show an ability to inn ...Login Get full Access
4 Products and Vendors at a Glance
This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on PAM. Aside from the rating ...Login Get full Access
Table 1: Comparative overview of the ratings for the product capabilities.
In addition, we provide in Table 2 an overview which also contains four a ...Login Get full Access
5 Product/Vendor evaluation
This section contains a quick rating for every product/service we've included in this KuppingerCole Leadership Compass document. For many of the produ ...Login Get full Access
Founded in 2006 and based in Mumbai (India), ARCON offers its Privilege Account Management Suite to manage privileged access across various delivery m ...Login Get full Access
BeyondTrust has continued to refine its portfolio of PAM products which now includes the Password Safe and DevOps Secrets Safe products, Endpoint Priv ...Login Get full Access
5.3 Broadcom Inc.
Broadcom has now rationalized all its identity products into the Identity Management Security Division of Broadcom Software, including this PAM platfo ...Login Get full Access
Based in the US, Centrify offers several PAM modules as part of an overall suite which includes credential and secrets vaulting, privilege access, aut ...Login Get full Access
Headquartered in Israel and the US, CyberArk is a highly mature PAM provider having been in the market since 1999. It has continued to add technical f ...Login Get full Access
Founded in 2010, Canadian firm Devolutions started with its Remote Desktop Manager aimed at SMBs. It has since added PAM solutions to its portfolio wi ...Login Get full Access
New to the KuppingerCole PAM Leadership Compass this year is Ekran System. Founded in 2013 and based in Newport Beach, California it specializes in Us ...Login Get full Access
Based in Ohio (US), EmpowerID offers several products within its broader IAM portfolio, of which EmpowerID Privileged Access Management (PAM) is targe ...Login Get full Access
5.9 Fudo Security
FUDO Security, with offices in California and Poland was founded in 2004. It offers FUDO PAM as its primary PAM product in the market. FUDO Security i ...Login Get full Access
5.10 Heimdal Security
Heimdal is a security vendor based in Copenhagen, Denmark. It sells various security software products including a stripped-down PAM tool which focuse ...Login Get full Access
5.11 Hitachi ID Systems
Hitachi ID, headquartered in Canada, is a global IAM software provider that originated as MTech Information Technology and acquired by Hitachi in 2008 ...Login Get full Access
5.12 Indeed Identity
Indeed Identity is a Lithuanian IAM vendor founded in 2011. It has now branched out into PAM, reflecting a recent trend in the industry of IAM and PAM ...Login Get full Access
Based in Turkey, Krontech is the technology arm of Kron, a telco firm publicly listed on the Istanbul stock exchange. Krontech offers its Ironsphere P ...Login Get full Access
Headquartered in Pleasanton, US, ManageEngine is a part of the India-based Zoho Corporation founded in 1996. PAM360 is the company's main modular offe ...Login Get full Access
5.15 Micro Focus
UK based software vendor Micro Focus, founded in 1976, has many solutions for organizations looking to transform operations and infrastructures. It ma ...Login Get full Access
5.16 One Identity
California-based One Identity, a Quest Software business, specializes in IAM solutions and offers a range of products that fulfill the fundamentals of ...Login Get full Access
Based in San Francisco, Remediant is a single product PAM company founded in 2013. Its SecureONE product uses agent-less and vault-less technology at ...Login Get full Access
Saviynt is a US based company founded in 2010 that specializes in IGA and Identity solutions. It fairly recently entered the PAM market with a new as- ...Login Get full Access
Founded in 2017, Mumbai (India) based Sectona is one of the newest PAM market entrants and offers four modules that cover fundamental PAM, Endpoint Pr ...Login Get full Access
Based in São Paulo, Brazil, MT4 Tecnologia produces Senhasegura as its flagship PAM product. Comprised of multiple modules, Senhasegura offers compre ...Login Get full Access
5.21 SSH Communications Security
Based in Helsinki, Finland, SSH.COM offers PrivX as its primary product for the PAM market. PrivX offers an alternative to traditional account & passw ...Login Get full Access
5.22 STEALTHbits Technologies
Founded 2002, Stealthbits is a US based company that offers several solutions designed to help organizations meet their GRC obligations. Part of this ...Login Get full Access
France based Systancia has several workplace and application virtualization tools. As part of this it offers the Cleanroom platform, which it develope ...Login Get full Access
Based in Washington D.C. (US), Thycotic offers Secret Server as its primary Password Management product and Privilege Manager for Endpoint Privilege M ...Login Get full Access
Based in France, WALLIX provides WALLIX Bastion as its primary PAM product in the market. At the core of Bastion is password management, session manag ...Login Get full Access
5.26 Xton Technologies
Founded in 2017 and based in the US, Xton Technologies offers its Xton Access Manager (XTAM) platform to enterprise customers with a strong emphasis o ...Login Get full Access
6.1 Deep Identity
Based in Singapore, Deep Identity is a regional provider of Identity Management software, offering Deep PIM as its primary PAM product which is essent ...Login Get full Access
San Francisco (US) based HashiCorp is a provider of application development and delivery management software for datacentres. Built on an open-source ...Login Get full Access
6.3 Identity Automation
Houston (US) based Identity Automation is an IAM solution provider that offers RapidIdentity Privileged Access Management as its PAM product in the ma ...Login Get full Access
India based IRaje offers Privileged Identity Manager (PIM) as a complete PAM solution with a compelling feature set and the flexibility to customize a ...Login Get full Access
6.5 NRI Secure Technologies
Japan based NRI Secure Technologies offers SecureCube Access Check primarily providing Privileged Session Management (PSM) capabilities. Operating in ...Login Get full Access
ObserveIT provides a comprehensive agent based Session Management platform that is deployable and scalable across a variety of IT systems. ObserveIT i ...Login Get full Access
US based Venafi offers TrustAuthority, a machine identity protection platform that also offers extensive SSH key management for securing privileged ac ...Login Get full Access
7 Related Research
Advisory Note: Trends in Privileged Access Management for the Digital Enterprise -71273
Architecture Blueprint: Access Governance and Privilege Management - 79045
Blog: PAM Can Reduce Risk of Compliance Failure but is Part of a Bigger Picture
Blog: Privileged Access Management Can Take on AI-Powered Malware to Protect
Blog: Taking One Step Back: The Road to Real IDaaS and What IAM is Really About
Leadership Brief: Privileged Account Management Considerations - 72016
Leadership Compass: Identity Provisioning - 70949
Leadership Compass: Identity Governance & Administration - 71135
Leadership Compass: Privilege Management - 72330
Whitepaper: AI, Machine Learning and Privilege Access Management - 80120
Whitepaper: Privileged Access Requirements for Small to Medium Size Businesses (SMB) - 80123
Whitepaper: Understanding Privilege Access Management - 80302