Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
287,741 professionals have used our research since 2012.
Find out what your peers are saying about CyberArk, CA Technologies, Quest Software and others in Privileged Identity Management.
287,741 professionals have used our research since 2012.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

What is Privileged Identity Management?

Privileged Identity Management (PIM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure. It is alternatively called Privileged Access Management, Privileged Account Management or Privileged Session Management – collectively known as PxM. A privileged user is a person who can access the administrative backend of a critical system, delete data or change settings. PIM is essential to strong security.

The Privileged Identity Management process is normally used as a tool for information security, and IT Central Station users look for richness in the functionality provided for oversight. Enterprises must prevent unauthorized backend system access while always adhering to compliance. Privileged Identity Management safeguards aggressive data breaches and is intended to protect confidential data from the efforts of bad actors. PIM is constantly being updated to protect the security of the enterprise IT Central Station users are responsible for controlling shared frameworks and monitor authorized user access along with interim levels of permissions for privileged access within an enterprise.

IT and DevOps teams look for a number of categories necessary for Privileged Identity Management, sometimes referred to as a “PIM Solution.” Requirements include life cycle and provisioning management, authorization, authentication, password management, access controls and auditing. Operating system components such as routers, switches, and firewalls all come into question with Privileged Identity Management.

Functionality must meet risk management and compliance parameters. The goal is to protect, control and monitor operating systems, applications and the database. This can be achieved in part through session recording and session isolation to prevent unauthorized access, always a concern whether IT is talking about on-premises or cloud solution.

IT professionals are looking for easy to use GUI, availability of OOTB integration functionalities with other systems and availability of OOTB connectors to manage password and sessions of devices. High availability / failover to DR environment with no data loss should be provided and scalable components are key. Time is always a factor, so having the agility and ability to establish and manage simultaneous operating sessions to target devices is ideal. Ultimately, speed, coverage and security are the best ways to keep out the bad guys.


Privileged Identity Management Reviews

Q&A Forum

Privileged Identity Management Articles

9
InfoSec Consultant
InfoSec Consultant - Account & Network Security CyberArk Vault Admin CyberArk Certified Professional Partner CyberArk Certified Sales Professional - CCSP Trainer, Internal Facilitator - Technology & Product Hardware Specialist White Hat - Ethical - Information Security Magician -... more>>
Reviewed Quest One Identity Manager: Allows for large customization. Needs to provide a...
25
CyberArk Consultant
LinkTo ►► yuqaili@hotmail.com ◄◄ All invitations to connect on LinkedIn are welcome - LION - 7K+ Never I D K Mohammad is a seasoned IT Security Professional with 10+ years of hands on IT experience, He has actively worked on multiple IT Security & Infrastructure Projects for major... more>>
Reviewed CyberArk Privileged Access Security: Preemptively helps us detect major threats and...
7,022
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
123
CyberArk PAS Solution Professional | Project Manager
An experienced professional with expertise in CyberArk PAS suite solution implementation, Project Management, Infrastructure Technologies and Enterprise Security Solutions. CyberArk PAS v7.2, v8.2 and v9.7 -Application / Solution Design -Implementation Security Solutions: -Identity... more>>
Reviewed CyberArk Privileged Access Security: Provides automatic password management. We can...
17
Global Privilege Access Management Technical Architect
CyberArk Privilege Access Management Architect
Reviewed CyberArk Privileged Access Security: All access to our servers, by both staff and...
26
Senior Consultant - Information Security Engineering
CISSP with 15+ years of enterprise-level experience in Information Security and Identity & Access Management, specializing in Directory Services, Provisioning, Single Sign-on technologies, RBAC, Access Governance, Privileged Identity Management (certified in CyberArk), File Integrity... more>>
Reviewed CyberArk Privileged Access Security: Can provide transparent connection to targeted...
335
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Access Security: It is clientless, and does not require any...
301
Cyber Security Consultant
Have 5 years of diverse experience in compliance, consulting, security tool implementation, configuration, IT Security and operations. Creative professional, proficient in prioritizing and completing tasks in a timely manner, yet flexible to multitask when necessary. Customer focused with diverse... more>>
Reviewed CyberArk Privileged Access Security: I can customize it to meet our customers'...
152
Senior Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Access Security: The combination of CPM and PSM resolves a lot of use...
31
TOP 20
IT Security Consultant
18+ years’ total experience in ICT area, focus and research on Network & Information Security, Forensic Investigation, Security Governance and Audit.
Reviewed CA Privileged Access Manager: Some of the valuable features include session...

Sign Up with Email