Gartner just published their 2017 Market Overview guide for PAM, and it is a great read! The drivers for PAM are similar to last year’s, with a new emphasis on the need for “a comprehensive cybersecurity defense strategy, specifically for critical infrastructure.” Here’s Gartner’s list of drivers, and we believe they are spot on in terms of what we are hearing from our customers and how we’ve delivered capabilities to help solve these issues:
- The risk of breaches and insider threats
- The need to prevent, isolate and limit malware attacks that leverage privileged accounts
- An increase of operational efficiency for administrator and operator access
- Regulation and failed audits, because auditors are paying closer attention to privileged accounts, and regulations are forcing organizations to record a trail of evidence for privileged access
- The need to grant privileged access to third parties: contractors, vendors and service provider technicians
- The need to address requirements for a comprehensive cybersecurity defense strategy, specifically for critical infrastructure
Password Vaults Alone Will Not Stop the Breach
The research paper recommends that “Organizations considering PAM tools should keep in mind that both types of tools (PASM and PEDM) are complementary, and some organizations eventually deploy both of them to address most risks associated with privileged access. Centrify agrees, and we believe we are unique in providing a single solution for PASM and cross-platform PEDM that was built-from the ground up to work together.
Gartner goes on to to recommend that “High-trust authentication, such as MFA, should always be used in conjunction with PAM tools,” and that “U.S. federal agencies that are required to use Personal Identity Verification (PIV) cards for authentication of privileged users as part of HSPD-12 and Cybersecurity Strategy and Implementation Plan (CSIP) directives should look out for vendors that offer native support for common access cards (CACs) and PIV cards.” Centrify’s privileged access security solution delivers PASM and PEDM with MFA for both, as well as smart card support out-of-the-box.
Command Filtering at the Proxy is Dead! Long-live Host-enforced Privilege Elevation
One other interesting change in Gartner’s market overview is the removal of “command filtering” as a key feature of PASM. In Gartner’s words, "while some vendors still offer this capability, its reliability varies, and has thus been eliminated from this year's research focus.” Centrify’s customers protect critical infrastructure where the data resides, on the host itself. Taking a host-enforced approach to privilege elevation, MFA and auditing ultimately results in better control over privileged access in your environment. Combining PASM with PEDM’s host-based nature, ensures your privileged access controls are not bypassed, as they can be with a password vault alone. Check out our videos on How to Stop Breaches that Abuse Privilege.
Centrify’s integrated privileged access security solution combines password vaulting with brokering of identities, MFA enforcement and just-enough privilege, all while securing remote access and monitoring all privileged sessions. By minimizing the attack surface and controlling privileged access to the hybrid enterprise, Centrify’s capabilities enable organizations to choose a comprehensive platform instead of disparate point product solutions to ensure users are who they say the are, only have the privileges they need to do their jobs and all privileged activity is monitored and attributed to an individual.
Interested in learning more? Read the full report here.
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.