Gartner Identifies Centrify as a Leader in the 2018 Privileged Access Management Magic Quadrant
Gartner’s first ever Magic Quadrant for Privileged Access Management1 (PAM) evaluates the key14 vendors based on Completeness of Vision and Ability to Execute. Centrify believes our position as a Leader in the PAM market is due to our ability to deliver an integrated, cloud-ready Zero Trust Privilege solution that covers Privileged Identity and Access Management, Privileged Account and Session Management, and Privilege Elevation and Delegation Management. Centrify uniquely enhances ALL of these services with embedded multi-factor authentication, privilege threat analytics and access request and approval workflow.
At its Security and Risk Management Summit in June, Gartner named Privileged Account Management as one of the Top 10 Security Projects for 20182 and in its Forecast Analysis: Information Security, Worldwide, 2Q18 Update, Gartner predicts PAM will be the second-fastest growing Information Security Segment by Spending Growth, in Constant Currency, Worldwide, in 20193.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.
Download a complimentary copy of the report to learn more about Gartner’s evaluations.
1Gartner, Magic Quadrant for Privileged Access Management, Felix Gaehtgens | Dale Gardner | Justin Taylor | Abhyuday Data | Michael Kelley, 03 December 2018.
2Gartner, Smarter with Gartner, Gartner Top 10 Security Projects for 2018, 6 June 2018. https://www.gartner.com/smarterwithgartner/gartner-top-10-security-projects-for-2018/.
3Gartner, Forecast Analysis: Information Security, Worldwide, 2Q18 Update, Ruggero Contu, Deborah Kish, Christian Canales, Sid Deshpande, Elizabeth Kim, Dale Gardner, 14 September 2018.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.