KuppingerCole recently published its 2019 KuppingerCole Leadership Compass for Privileged Access Management (PAM), again recognizing Centrify as a Leader as it did in the previous iteration in June 2017.
This marks the third major PAM Market research report in the past 6 months where Centrify was recognized as a Leader, following the same recognition in The Forrester Wave: Privileged Identity Management (PIM), Q4 2018 and the Gartner Magic Quadrant for Privileged Access Management, Q4 2018. We’re honored to go “3 for 3,” and believe this is a strong validation of Centrify’s Zero Trust Privilege approach.
A complimentary version of this report is available to download here: https://www.centrify.com/lp/2019-kuppingercole-leadership-compass-report-for-pam/
PAM is even more important in today’s world, given the capabilities of cyber-attackers. 74% of data breaches involve privileged access abuse, according to our recent survey of 1,000 IT decision makers. The urgency to secure this leading attack vector is reflected in KuppingerCole Lead Analyst Anmol Singh’s introductory comments in the PAM Leadership Compass report:
“PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and impact on an organization’s cybersecurity program…Once considered a technology option for optimizing administrative efficiency by managing passwords and other secrets, PAM has evolved into a set of crucial technologies for preventing security breaches and credential thefts.”
KuppingerCole evaluated 19 vendors in the 2019 PAM Leadership Compass, assessing the market segment and the major vendors offering PAM solutions to rate them for Product Leadership, Innovation Leadership, and Market Leadership. Centrify was not only named an Overall Leader in the report, but also a Leader in all three categories as well as all correlated categories including Market Champions, Technology Leaders, and Big Ones (its Innovation/Market Matrix).
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
We believe our positioning in the Leader quadrant is strongly driven by our mission to redefine legacy PAM. As KuppingerCole notes in the report:
“Emerging technology initiatives such as digital workplace, DevOps, security automation and the Internet of Things continue to expand the attack surface of organizations as well as introduce new digital risks… With the attack surface expanding and the number and sophistication of attacks increasing every year, an integrated and more comprehensive PAM solution is required – one that can automatically detect unusual behavior and initiate automated mitigations.”
We also believe a common theme throughout all three major research reports is recognizing Centrify’s leadership in PAM-as-a-Service, strong AD integration, privileged analytics, and our approach to PAM founded in Zero Trust.
Centrify delivers differentiated PAM built on Zero Trust principles by:
- Delivering a secure admin environment for privileged access
- Focusing on utilizing individual identities rather than shared accounts
- Enabling usage of federated, short-lived tokens for authentication rather than static passwords
- Emphasizing MFA at ALL points of the PAM process
- Integrating with ServiceNow and/or SailPoint for access request and approval workflow
- Having accessible APIs to automate PAM for DevOps and Service Accounts.
We emphasize that Centrify was the first to offer PAM-as-a-Service with flexible deployment offerings to also be customer-managed in your own datacenter. Centrify continues to be the only true cloud-architected, multi-tenant PAM offering on the market today.
For more information about Centrify’s Zero Trust Privilege services, click here.
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.