Project Manager at a consultancy with 501-1,000 employees
Real User
2021-02-18T04:44:58Z
Feb 18, 2021
Hi Simone,
Following are the products which you can look for your requirement. I recommend to select any solutions depend on the your organization need. Is it needed on premise or on cloud. Do you need SAAS service or have in house deployment. On these conditions cost will differ. My personal opinion is
CyberArk,
Thycotic,
Wallix
Beyondtrust
Microsoft Azure AD Premium
Thanks,
Kishan
Search for a product comparison in Privileged Access Management (PAM)
I would first state that you are asking an unqualified question. The PAM tool that matches your organizations requirements, use cases, volume, and many other considerations, will need to be considered in this equation. I like the previous answer by Kishan as I like those products and see them employed successfully. The converse is also true if not carefully scoped and evaluated.
PAM tools can be costly and contain confounding arrays of security features and terminology synchronization will be key in ensuring you are getting what you actually are asking for. On top of the software cost implications you will have the Architectural, Implementation, and Administration costs nipping at your heels. Consider also that this is not a "PAM Project", but a long term Program and buy-off must start from the very top of your organization.
I have witnessed, and participated, in projects that started out with your question, and many went off the rails, unless important considerations are taken into account:
1. Define your requirements with granularity, including integration with your existing infrastructure such as: Authentication / Authorization / MFA, syslog, analytics, Disaster Recovery and High Availability just to name a few.
2.Determine your overall goals relating to Least Privilege, Standing Privilege, Just in time Privilege, and No standing privilege. Do you require Session Recording and Keystroke Logging, as they are not always bundled into the initial price and sometimes not together, and may be individual features in your initial quotations and can unpleasantly surprise you.
3. Provision a comprehensive test environment to confirm the viability of the product choices within your infrastructure.
4. Select a vendor or integration partner to back-fill the expertise gaps in your organization as these skill-sets are very expensive and marketable.
I apologize for not answering your question directly, but I would consider looking into the Gartner resources, KuppingerCole and so on.
In a short direct answer I favor CyberArk, BeyondTrust, Thycotic, Centrify, and StealthBits, and these are definitely not in any preferential order.
VP & Head of Cybersecurity Manager at a financial services firm with 1,001-5,000 employees
Real User
2021-02-18T13:34:36Z
Feb 18, 2021
Hi Simone,
When we started the PAM journey we POC'ed three vendors based on the use cases and the roadmap for your requirements. Since the world is shifting to cloud infrastructure, i would recommend looking at these vendors.
One Identity (Safe Guard), CyberArk, and Beyondtrust. We decided to go with One Identity because it was the right fit for our use cases and requirements. We have been using safe guard for several years and it did not disappoint so far! Rock Solid tool.
Director at a tech services company with 1-10 employees
Real User
Top 20
2021-02-19T05:11:27Z
Feb 19, 2021
When It comes to PAM, I would say Thycotic, CyberArk, BeyondTrust are the ones I normally include in RFPs. However, where your environment is exclusively Azure cloud-based, I say that Microsoft's Azure AD Premium provides a pretty good PIM solution. These are different solutions to achieve the same goal of managing privileged access.
Learn what your peers think about CyberArk Privileged Access Manager. Get advice and tips from experienced pros sharing their opinions. Updated: June 2023.
Hello peers,
I work for a large computer software company and I am currently researching PAM solutions.
Which solution do you prefer: ARCON Privileged Access Management or Microsoft PAM? What are the pros and cons of each solution?
Thank you for your help.
Hello Siby, I suggest looking for PAM-leading solutions, both solutions you have mentioned are not recommended, Microsoft doesn't have a PAM solution and Arcon won't fulfill the local compliance requirements like NESA, etc.... check solutions that are leading in the PAM area.
Hello community,
I am a Director at a large financial services firm.
I am looking for a tool that will help me limit the privileges given to administrators and privileged users. Which tool do you recommend and why?
Thank you for your help.
Technical Account Manager (Information Security) at Trustaira
Dec 23, 2022
Hi,
If you share the devices/asset category may get the best suitable answer from this community. Here I can help you with the system privilege maintenance. If your organization has a Windows and Linux base, then you can choose the Delinea Server Suite solution to manage all privileged users. Why is Delinea Server Suite best for your organization? I hope your Windows asset is managed by a domain controller that manages your users and also manages the group policy. To use Server Suite, you can join your Linux systems in your domain controller by creating the zoning policy. To use this solution you can also manage the MFA/2FA in your all system (Windows/Linux). When a privileged user uses any administrative command in that time, approval is required by an admin from Server Suite. The admin can also create the workflow to execute any command needed to give the security question before executing that. So you can minimize your effort when you connect your Linux environment and workgroups assets in Domain Controller and based on your policy, you create the group policy for users and assign it from a single pane of glass.
Hello, I think you would find a lot of value in taking a look at Remediant's solution called SecureONE. As you may know, lateral movement is the step that makes domain-wide attacks possible. We specialize in stopping lateral movement by discovering standing privileges and removing them. These days, a compromise of one machine is almost guaranteed, so it's important to see where else on the network do the compromised credentials have access. We give you visibility of where standard users' credentials as well as administrators' credentials have access to within your organization. Many customers do not realize the spread and severity of standing privileges, even when they may already have a vault and application control in place. If this sounds any bit interesting, please visit our website and schedule a demo. Thank you!
Top 5 Privileged Access Management (PAM) Tools
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews ...
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, firewalls, IDS, IPS, SIEMs and email gateways are no longer considered fully effective. It needs to be c...
As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.
What is Privileged Account Management (PAM)?
Privileged account management can be defined as managing and auditing account and data access by privileged users.
A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user.
Lik...
Hi Simone,
Following are the products which you can look for your requirement. I recommend to select any solutions depend on the your organization need. Is it needed on premise or on cloud. Do you need SAAS service or have in house deployment. On these conditions cost will differ. My personal opinion is
CyberArk,
Thycotic,
Wallix
Beyondtrust
Microsoft Azure AD Premium
Thanks,
Kishan
I would first state that you are asking an unqualified question. The PAM tool that matches your organizations requirements, use cases, volume, and many other considerations, will need to be considered in this equation. I like the previous answer by Kishan as I like those products and see them employed successfully. The converse is also true if not carefully scoped and evaluated.
PAM tools can be costly and contain confounding arrays of security features and terminology synchronization will be key in ensuring you are getting what you actually are asking for. On top of the software cost implications you will have the Architectural, Implementation, and Administration costs nipping at your heels. Consider also that this is not a "PAM Project", but a long term Program and buy-off must start from the very top of your organization.
I have witnessed, and participated, in projects that started out with your question, and many went off the rails, unless important considerations are taken into account:
1. Define your requirements with granularity, including integration with your existing infrastructure such as: Authentication / Authorization / MFA, syslog, analytics, Disaster Recovery and High Availability just to name a few.
2.Determine your overall goals relating to Least Privilege, Standing Privilege, Just in time Privilege, and No standing privilege. Do you require Session Recording and Keystroke Logging, as they are not always bundled into the initial price and sometimes not together, and may be individual features in your initial quotations and can unpleasantly surprise you.
3. Provision a comprehensive test environment to confirm the viability of the product choices within your infrastructure.
4. Select a vendor or integration partner to back-fill the expertise gaps in your organization as these skill-sets are very expensive and marketable.
I apologize for not answering your question directly, but I would consider looking into the Gartner resources, KuppingerCole and so on.
In a short direct answer I favor CyberArk, BeyondTrust, Thycotic, Centrify, and StealthBits, and these are definitely not in any preferential order.
Hi Simone,
When we started the PAM journey we POC'ed three vendors based on the use cases and the roadmap for your requirements. Since the world is shifting to cloud infrastructure, i would recommend looking at these vendors.
One Identity (Safe Guard), CyberArk, and Beyondtrust. We decided to go with One Identity because it was the right fit for our use cases and requirements. We have been using safe guard for several years and it did not disappoint so far! Rock Solid tool.
When It comes to PAM, I would say Thycotic, CyberArk, BeyondTrust are the ones I normally include in RFPs. However, where your environment is exclusively Azure cloud-based, I say that Microsoft's Azure AD Premium provides a pretty good PIM solution. These are different solutions to achieve the same goal of managing privileged access.