2022-01-02T22:42:00Z
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
  • 381
Published:

Privileged Access Management as a Service (PAMaaS): benefits and service offerings

Search for a product comparison in Privileged Access Management (PAM)
2
PeerSpot user
2 Comments
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Real User
ExpertModerator
2022-01-17T01:52:40Z
Jan 17, 2022

HI @DavidMateju​,


Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.

DM
Director at DNAX s.r.o.
User
2022-01-12T11:56:10Z
Jan 12, 2022

As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.

Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
686,748 professionals have used our research since 2012.
Related Questions
ML
Director at Seg Inf
Dec 23, 2022
Hello community,  I am a Director at a large financial services firm. I am looking for a tool that will help me limit the privileges given to administrators and privileged users. Which tool do you recommend and why? Thank you for your help.
See 2 answers
NajibulIslam - PeerSpot reviewer
Technical Account Manager (Information Security) at Trustaira
Dec 23, 2022
Hi, If you share the devices/asset category may get the best suitable answer from this community. Here I can help you with the system privilege maintenance. If your organization has a Windows and Linux base, then you can choose the Delinea Server Suite solution to manage all privileged users. Why is Delinea Server Suite best for your organization? I hope your Windows asset is managed by a domain controller that manages your users and also manages the group policy. To use Server Suite, you can join your Linux systems in your domain controller by creating the zoning policy. To use this solution you can also manage the MFA/2FA in your all system (Windows/Linux). When a privileged user uses any administrative command in that time, approval is required by an admin from Server Suite. The admin can also create the workflow to execute any command needed to give the security question before executing that. So you can minimize your effort when you connect your Linux environment and workgroups assets in Domain Controller and based on your policy, you create the group policy for users and assign it from a single pane of glass.
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 23, 2022
Hello, I think you would find a lot of value in taking a look at Remediant's solution called SecureONE.  As you may know, lateral movement is the step that makes domain-wide attacks possible. We specialize in stopping lateral movement by discovering standing privileges and removing them. These days, a compromise of one machine is almost guaranteed, so it's important to see where else on the network do the compromised credentials have access. We give you visibility of where standard users' credentials as well as administrators' credentials have access to within your organization. Many customers do not realize the spread and severity of standing privileges, even when they may already have a vault and application control in place. If this sounds any bit interesting, please visit our website and schedule a demo. Thank you!
AG
Associate VP & Cyber Security Specialist at Union Bank of California
Dec 7, 2022
Hello community,  I am the Associate VP and Cyber Security Specialist at a large bank. I am researching PAM tools. These are our requirements for the PAM tool needed: - Privileged Access Governance and Administrative - Privileged Accounts Discovery and Management - Privileged Credentials Management - Privileged Session Management - Privileged Access Logging, Reporting, and Audit - Privi...
See 1 answer
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform help...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Dec 11, 2021
What is Privileged Account Management (PAM) and How Does It Work?
                                What is Privileged Account Management (PAM)? Privileged accoun...
Download Free Report
Download our free CyberArk Privileged Access Manager Report and get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
DOWNLOAD NOW
686,748 professionals have used our research since 2012.