Privileged identity management report from it central station 2017 08 26 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, BeyondTrust and others in Privileged Identity Management.
227,901 professionals have used our research on 5,829 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product (and the bar length) is based on a weighted aggregate ranking. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The product with the highest count in each area gets the highest available score of 17.5 points. Every other product gets assigned points based on its total in proportion to the #1 product in the category. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score and bar length for reviews would be 17.5% (weighting factor) * 80% = 14.
In the final section, Average Rating, there are 30 points available to each product independent of the other products.
Reviews and ratings that are more than 24 months old, as well as those by resellers, are excluded

What is Privileged Identity Management?

Privileged Identity Management (PIM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure. It is alternatively called Privileged Access Management, Privileged Account Management or Privileged Session Management – collectively known as PxM. A privileged user is a person who can access the administrative backend of a critical system, delete data or change settings. PIM is essential to strong security.

The Privileged Identity Management process is normally used as a tool for information security, and IT Central Station users look for richness in the functionality provided for oversight. Enterprises must prevent unauthorized backend system access while always adhering to compliance. Privileged Identity Management safeguards aggressive data breaches and is intended to protect confidential data from the efforts of bad actors. PIM is constantly being updated to protect the security of the enterprise IT Central Station users are responsible for controlling shared frameworks and monitor authorized user access along with interim levels of permissions for privileged access within an enterprise.

IT and DevOps teams look for a number of categories necessary for Privileged Identity Management, sometimes referred to as a “PIM Solution.” Requirements include life cycle and provisioning management, authorization, authentication, password management, access controls and auditing. Operating system components such as routers, switches, and firewalls all come into question with Privileged Identity Management.

Functionality must meet risk management and compliance parameters. The goal is to protect, control and monitor operating systems, applications and the database. This can be achieved in part through session recording and session isolation to prevent unauthorized access, always a concern whether IT is talking about on-premises or cloud solution.

IT professionals are looking for easy to use GUI, availability of OOTB integration functionalities with other systems and availability of OOTB connectors to manage password and sessions of devices. High availability / failover to DR environment with no data loss should be provided and scalable components are key. Time is always a factor, so having the agility and ability to establish and manage simultaneous operating sessions to target devices is ideal. Ultimately, speed, coverage and security are the best ways to keep out the bad guys.


Privileged Identity Management Reviews

Read reviews of Privileged Identity Management that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Privileged identity management report from it central station 2017 08 26 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, BeyondTrust and others in Privileged Identity Management.
227,901 professionals have used our research on 5,829 solutions.
Privileged identity management report from it central station 2017 08 26 thumbnail
Find out what your peers are saying about CyberArk, CA Technologies, BeyondTrust and others in Privileged Identity Management.
227,901 professionals have used our research on 5,829 solutions.

Privileged Identity Management Questions

Ddp 8148
Ariel Lindenfeld
Community Mgr
Sr. Director of Community
IT Central Station
Anonymous avatar x30
Jane GraftonSpeed and coverage. You need to change privileged passwords faster than... more »
1c258dfa 4280 450b bd6c 95acffee2af7 avatar
Malhar VoraFew key aspects I would look for in the PIM solution are,... more »
3e5d5d83 8fea 466d a3d4 fd09d578f59c avatar
Francis LaPlanteFirst: Make sure it has all the functionality your company absolutely... more »

Privileged Identity Management Articles

Birzu alexandru adrian li?1414334311
5,261

3
TOP 5POPULAR
ITSM & AntiFraud Consultant
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement. Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new... more>>
D3e3d3db 5533 4753 9c1c 07c0cd4d36e7 avatar
97
Cyberark Consultant
KEY STRENGHS • Proficiency in business process mapping, requirement study, client interaction for finalizing requirements and defining functional specifications for application implementation • An effective communicator with relationship management and problem solving skills • Ability to... more>>
Reviewed CyberArk Privileged Account Security: The combination of CPM and PSM resolves a lot of use...
F642cd8a 4a28 4842 9165 f7f14a2d7665 avatar
10
IT Security Consultant
18+ years’ total experience in ICT area, focus and research on Network & Information Security, Forensic Investigation, Security Governance and Audit.
Reviewed CA Privileged Access Manager: Some of the valuable features include session...
2f6ad1ac 3649 4caa 9b3f 6f0b55bcadb4 avatar
92
TOP 20
Senior IT Consultant
Reviewed Quest One Identity Manager: A portal for user requests and authorizations which...
5a00a002 1a46 4d2e b8fb 5f0ea82ff632 avatar
256
IT Security Consultant
Information Technology and IT Security professional with 7.6 year experience in planning, solution designing implementation/deployment of Privileged Identity management, Security Support and Operations, Process implementation and documentations, LDAP Directories, Privilege Single Sign-On (PSSO),... more>>
Reviewed CyberArk Privileged Account Security: It is clientless, and does not require any...
4376eb72 ab0f 445f 9ce6 22f49612b3fa avatar
34
TOP 20
Security Consultant
Reviewed IBM Security Privileged Identity Manager: Session recording and replay provides forensic...
4c5e3f3f c7f0 4b9e 8a29 5ec15ddf1447 avatar
24
TOP 20
IAM Consultant
Reviewed IBM Security Privileged Identity Manager: We have achieved centralized password management....
92d6de44 1eee 47f0 8981 b796574d8ebc avatar
20
TOP 20
Identity Management Consultant
Reviewed Lieberman Software Enterprise Random Password Manager: It allows us to enumerate all machines from an...
56b501cf 3896 45a2 862a 56d260b90e2e avatar
278
TOP 20
CIO/Management Consultant
Reviewed CA Privileged Access Manager: Privileged users see only those systems and access...
Anonymous avatar x100
179
Security Technical Consultant
Reviewed CyberArk Privileged Account Security: It allows you to target application-level access as...
Anonymous avatar x100
27
CyberArk Consultant
Reviewed CyberArk Privileged Account Security: The password management component (CPM) is the most...
Anonymous avatar x100
6
Principal Consultant
Reviewed CA Privileged Access Manager: Some of the valuable features are safe access to...
Anonymous avatar x100
9
Business Coach & Consultant
Reviewed CA Privileged Access Manager: When people are accessing our production environment...

Sign Up with Email