The Forrester Wave™: Privileged Identity Management, Q3 2016
The 10 Providers That Matter Most And How They Stack Up
July 8, 2016
Why Read This Report
In our 22-criteria evaluation of privileged identity management (PIM) providers, we identified the 10 most significant vendors — Balabit, BeyondTrust, Bomgar, CA Technologies, Centrify, CyberArk, Dell, Lieberman Software, ManageEngine, and Thycotic — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($2495 USD).Purchase
Tools And Templates
Vendor Selection Aids
- Forrester Wave™: Privileged Identity Management, Q3 '16
Table of Contents
- PIM Is Critical For Defeating Threats And Minimizing Data Breaches
- The PIM Market: More Endpoints, Policies, And Behaviors
- PIM Evaluation Overview
- Vendor Profiles
- Supplemental Material
- Related Research Documents
TechRadar™: Identity And Access Management (IAM), Q1 2016
January 22, 2016 | Andras Cser
Ten Basic Steps To Secure Software Containers
April 14, 2017 | Amy DeMartine
Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention
March 10, 2017 | Jeff Pollard