Key Criteria for Evaluating Privileged Access Management v1.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. Privileged Access Management Primer
  3. Report Methodology
  4. Decision Criteria Analysis
  5. Evaluation Metrics
  6. Key Criteria: Impact Analysis
  7. Analyst’s Take
  8. About Alastair Cooke

Summary

Privileged Access Management (PAM) enables administrative access to critical IT systems, while minimizing the chances of security compromises through monitoring, policy enforcement, and credential management.

This report looks at the risks of staff or partners with more than standard user access and considers how a PAM solution can ensure these privileges are only used when and where appropriate. In it we explore how PAM solutions provide elevated access (such as server administration and security policy management), without revealing credentials.

Full report available to GigaOm Subscribers.

Subscribe to GigaOm Research