For Security & Risk Professionals

Market Overview: Privileged Identity Management

Six New Features And Capabilities Redefine PIM Architecture

    Why Read This Report

    Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator activity in highly sensitive environments, such as production databases, domain controllers, and network infrastructure equipment. In the past, controlling distribution of passwords to these environments was enough, but today, auditors have started to pay much closer attention to what administrators actually do in these environments. Auditors now want to monitor, record, and control administrator actions to the finest level of detail possible. This has forced many changes in PIM architecture. Vendors must now provide more robust features and capabilities in their product stack, such as secure channels, provisioning integration, credentials distribution, sensitive entitlement enforcement, session recording, and auditing. To support risk models in IT administration, Forrester expects that PIM architectures will evolve in the future to encapsulate fraud management and pattern recognition.
    US $2495
    Add To Cart
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.


    • Savvy Auditors Demand Increased Scrutiny Of Privileged Identities
    • Six Features Redefine PIM Architecture
    • The PIM Market Grew Appreciably Despite A Tough Economic Environment
    • Vendors Focus On Session Management
    • PIM Will Apply To Business Users And Shared Accounts In The Future

      You Must Manage Privileges For Both Physical And Virtual Servers
    • Related Research Documents