Trends Report

Privileged User Management Market Overview

Centrally Managing System Administrator And Application Credentials

June 30th, 2008
With contributors:
Jonathan Penn , Allison Viglianti

Summary

Managing privileged users' access to sensitive systems needs to be centralized, policy-driven, and automated: Manual paper- or spreadsheet-based solutions are insecure, expensive, don't scale, and can't be sufficiently audited. Privileged user and password management (PUPM) encompasses password vault products, fine-grained administrative policy management, and provisioning add-on solutions, all providing efficient and reliable controls for administrator access. Cyber-Ark Software, e-DMZ Security, and Lieberman Software stand out in terms of customer base and adoption in the arena of password safe products. Some identity and access management (IAM) vendors, such as IBM and CA, and smaller provisioning vendors, such as Fischer International and Hitachi ID Systems, don't distribute passwords but are more tightly integrated with identity management solutions.

Want to read the full report?

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.