Centrify Again Named a Leader in 2020 Gartner Magic Quadrant for Privileged Access Management
Centrify Recognized as a Leader for PAM for Second Consecutive Time in Gartner’s Evaluation Based on Completeness of Vision and Ability to Execute
August 10, 2020
SANTA CLARA, Calif. ― August 10, 2020 ―, a leading provider of Identity-Centric Privileged Access Management (PAM) solutions, today announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2020 Gartner Magic Quadrant for Privileged Access Management. The report evaluated 12 vendors based on completeness of vision and ability to execute.1
GET A COMPLIMENTARY COPY OF THE 2020 GARTNER MAGIC QUADRANT FOR PRIVILEGED ACCESS MANAGEMENT HERE:
“We are proud to again be recognized as a Leader in the Gartner Magic Quadrant for Privileged Access Management,” said David McNeely, Chief Strategy Officer at Centrify. “We believe our position in the Leaders quadrant validates the flexibility of our cloud-architected SaaS-based solution for modern PAM. Furthermore, our rich history in Active Directory bridging, as well as our support for modern cloud identity infrastructures that empower federated access, are at the core of our Identity-Centric PAM approach.”
Over the past few years, it has become evident that privileged credentials are the enabling targets that cyber-attackers are after, evidenced by Centrify research that shows nearly. Concurrently, digital transformation has significantly expanded the IT landscape and increased the number of potential vulnerabilities that can be exploited by threat actors. The increase in cyber-attacks and the expanding attack surface that now includes cloud, DevOps, containers, microservices, and more has made securing access to the modern IT estate more challenging than ever.
Centrify believes a more modern approach is required, which reduces the reliance on shared passwords in a vault and instead grants least privilege based on individual identities, whether they are human or machine. By taking an Identity-Centric approach to PAM, privileged users log in as themselves and the concept of least privilege can be enforced to only permit just enough,privileged access.
“Our interpretation of our placement for Completeness of Vision is that it validates that we are taking a different approach to Privileged Access Management that is cloud-first, and centered around identity as the key to authentication, privileged access controls, and zero standing privilege,” McNeely continued.
Centrify was also named a Leader in the inaugural 2018 Gartner Magic Quadrant for Privileged Access Management. Gartner named Privileged Account Management as one of the Top 10 Security Projects for 2019.
Get a complimentary copy of the report from Centrify to learn more about Gartner’s evaluations:.
1 Gartner, Magic Quadrant for Privileged Access Management, Felix Gaehtgens, Abhyuday Data, Michael Kelley, 4 August 2020.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Centrify is redefining the legacy approach to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
©Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.