skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

This Ovum Decision Matrix provides in-depth analysis of the leading privileged identity management solutions. It compares their technology, their market positioning, their ability to execute, and the overall maturity of each offering.

Highlights

  • Businesses have seen the damage a rogue user with admin rights can cause. Their recent experiences of data breaches that have exploited privileged credentials is leading IT security teams to take a closer look at PIM technology.

Features and Benefits

  • Understand that there are three main vendor groups competing in the PIM arena: specialists, point solution providers, and IAM platform vendors.
  • Understand why PIM extends beyond controlling small groups of systems administrators and how it addresses enterprise data protection.
  • Understand why external parties including partners, contractors, and third-party service providers must have their access rights controlled.

Key questions answered

  • What are the three main vendor groups competing in the PIM arena?
  • How does PIM extend beyond controlling small groups of systems administrators and how it addresses enterprise data protection?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key findings

Vendor solution selection

  • Inclusion criteria
  • Exclusion criteria
  • Methodology
  • Ovum ratings
  • Ovum Decision Matrix Interactive

Market and solution analysis

  • Ovum Decision Matrix: Privileged Identity Management (PIM), 2015-2016
  • Market leaders: vendor solutions
  • Market challengers: vendor solutions
  • Market followers: vendor solutions
  • Emerging vendors

Market leaders

  • Market leaders: technology
  • Market leaders: execution
  • Market leaders: market impact

Vendor analysis

  • Balabit – Shell Control Box (Ovum recommendation: Follower)
  • BeyondTrust – Privileged Identity Management Portfolio (Ovum recommendation: Challenger)
  • CA Technologies – Privileged Identity Manager Product Suite (Ovum recommendation: Leader)
  • Centrify – Server Suite 2015 and Privilege Service (Ovum recommendation: Challenger)
  • CyberArk – Privileged Account Security Solution (Ovum recommendation: Leader)
  • Dell – Dell One, Privilege Management (Ovum recommendation: Challenger)
  • Hitachi ID – Privileged Access Manager (Ovum recommendation: Leader)
  • IBM Security – Privileged Identity Manager (Ovum recommendation: Challenger)
  • Lieberman – Enterprise Random Password Manager (Ovum recommendation: Leader)
  • Oracle – Privileged Account Manager (Ovum recommendation: Follower)

Appendix

  • Methodology
  • Further reading
  • Authors

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now