
Identity at the Center #46 – The 2020 KuppingerCole Leadership Compass for Privileged Access Management
Jun 1, 2020
Dive into the latest trends in Privileged Access Management (PAM) with insights on market growth driven by cloud and compliance needs. Explore the nuances of vendor messaging that often masks true capabilities. Jim and Jeff break down essential PAM functionalities, from managing privileged account lifecycles to implementing just-in-time access. They also highlight behavior analytics for risk detection and the competitive landscape, showcasing leaders like CyberArk while comparing strengths of others. Discover the key to choosing the right PAM solution tailored to your needs!
AI Snips
Chapters
Transcript
Episode notes
Vaulting Is The Core PAM Pattern
- Core traditional PAM prevents humans from knowing privileged passwords by vaulting and rotating credentials.
- Session launch and recording preserve operation ability while keeping passwords hidden.
Don't Equate Provisioning With Governance
- Treat provisioning as only one slice of identity governance and capture a single view of who has access to what.
- Layer access reviews, role design, and request workflows on top rather than calling provisioning 'governance.'
Remove Hard‑Coded Secrets
- Remove hard‑coded secrets from scripts and fetch credentials from your PAM vault at runtime.
- Start with vaulting then expand into programmatic retrieval for DevOps automation.
