skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

Ovum is seeing growing interest in privileged identity management (PIM), driven by the rise of targeted attacks that steal privileged users’ credentials to steal corporate data or to damage enterprise infrastructures.

Highlights

  • As a result, the PIM market has evolved beyond the small, dedicated players, with a number of larger vendors from the identity and access management (IAM) domain expanding into it, frequently positioning it as an add-on module for their IAM platforms.

Features and Benefits

  • Understand the evolution of privileged identity management.
  • Understand the shortcomings of vaults and proxies as well as ways to complement these with other technologies.

Key questions answered

  • Why is a password vault not enough for managing privileged access?
  • If I choose a proxy/bastion server for PIM, am I still at risk?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises

PIM is not just “IAM on steroids”

  • IAM is all about CRUD
  • Privileged access is more dynamic
  • Least privilege is becoming the norm
  • Privilege now extends far beyond sysadmins

Even the PIM acronym is now questionable

  • Privileged access management is arguably more accurate

Vaults and proxies are not enough on their own

  • Vaults are too static for the current environment
  • Proxies provide another means of controlling privileged access

New techniques must be applied for security

  • Credential rotation and destruction are now essential
  • Behavioral monitoring also comes into play

Appendix

  • Further reading
  • Author

Recommended Articles

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Enterprise Services

    5G: Another technology in search of enterprise use cases

    By Evan Kirchheimer 26 Apr 2018

    Service provider interest in justifying 5G investment through its potential to open new revenue streams from the enterprise segment is growing ever greater.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now