By using this site, you agree to the IDC Privacy Policy

TECH SUPPLIER Sep 2019 - Market Note - Doc # US44775119

Privileged Access: Expanding Beyond the Core and into the Cloud

By: Jay BretzmannProgram Director, Security Products

Abstract

This IDC Market Note provides IDC's commentary on the privileged access management market dynamics. Although elements of the CyberArk platform can be resource intensive to deploy and configure, the company continues to deliver both what its customer base requests and significant extensions to the platform to cover the growth of privileged access accounts generated by technologies facilitating digital transformations and IoT device inclusion. For example, one could walk away from a CyberArk demo and believe there are other offerings that look and feel more intuitive to use, but dyed-in-the-wool PAM users appreciate CLI capabilities over fancy GUIs. They want power and automation and don't shy away from a console interface. In addition, with the addition of its SaaS portfolio, CyberArk is committed to providing its customers with easy-to-deploy and manage services.

The nature of a privileged access solution is not only providing control but also satisfying the requirements of myriad government and industry compliance resolutions. Adding support for everything under the sun is a daunting task, and a burden that leading vendors always face; consequently, CyberArk is prioritizing its investments, expanding partnerships and, lately, benefitting from the user community as users post and participate in the marketplace. Eventually, CyberArk will face the challenge coming from young, born-on-the-cloud organizations that have minimal legacy baggage or restrictions. Privileged access for these companies can be a simpler deal given that they even recognize the need earlier in their growth cycle. The question here is whether they'll recognize the value that a wholistic platform delivers over other cheaper, simpler, or friendlier solutions that meet immediate needs but may fall short of meeting the evolving security needs of a rapidly growing native cloud organization.


Coverage

Content


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Do you have questions about this document
or available subscriptions?

Contact Us