Laptop Displaying the GigaOm Research Portal

Get your Free GigaOm account today.

Access complimentary GigaOm content by signing up for a FREE GigaOm account today — or upgrade to premium for full access to the GigaOm research catalog. Join now and uncover what you’ve been missing!

Key Criteria for Evaluating Privileged Access Managementv1.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. Privileged Access Management Primer
  3. Report Methodology
  4. Decision Criteria Analysis
  5. Evaluation Metrics
  6. Key Criteria: Impact Analysis
  7. Analyst’s Take

1. Summary

Privileged Access Management (PAM) enables administrative access to critical IT systems, while minimizing the chances of security compromises through monitoring, policy enforcement, and credential management.

This report looks at the risks of staff or partners with more than standard user access and considers how a PAM solution can ensure these privileges are only used when and where appropriate. In it we explore how PAM solutions provide elevated access (such as server administration and security policy management), without revealing credentials.