Browsed by
Category: Privileged Activity Management

Stealthbits Named Innovation Leader in New KuppingerCole Leadership Compass for PAM

Stealthbits Named Innovation Leader in New KuppingerCole Leadership Compass for PAM

The privileged access management (PAM) market is heating up! According to the 2020 KuppingerCole Leadership Compass for PAM there are roughly 40 vendors in the space with combined annual revenue of $2.2 billion, which is predicted to grow to $5.4 billion a year by 2025. This represents a compound annual growth rate (CAGR) of 20%. The takeaway: More and more organizations are looking to invest in the next generation of PAM solutions, which offer advantages over more traditional and now…

Read More Read More

Reduce PAM Switching Costs With Bring-Your-Own-Vault – Leverage Your Existing Password Vault

Reduce PAM Switching Costs With Bring-Your-Own-Vault – Leverage Your Existing Password Vault

Why Do Many PAM Deployments Fail or Fall Short of Expectations? Complexity and optimism of scalability. Fail may be too strong of a word, maybe “don’t reach their full potential” is a better way to describe most Privileged Access Management (PAM) projects. They start off complex between vaults, modules, configurations, redefining roles, collapsing access, and more often lasting 6-9 months if lucky, longer if not. Once PAM solutions get implemented, use cases start to grow and pop-up over time. From…

Read More Read More

What is Just-in-Time (JIT) Privileged Access?… It Doesn’t Mean an Auto-Reduction of Standing Privileges

What is Just-in-Time (JIT) Privileged Access?… It Doesn’t Mean an Auto-Reduction of Standing Privileges

What is Just-in-Time (JIT) Privileged Access? Just-in-time (JIT) is the latest new buzz word in the world of Privileged Access Management (PAM). ‘Just-In-Time Access’, ‘Just-In-Time Privilege’, ‘Just-In-Time Privilege Access’ an internet search brings up a multitude of vendors offering clickbait as to why using their solution is best. The problem is JIT can be accomplished in different ways and not all are created equal. Continue reading to understand JIT differences so you can make informed buying decisions that actual improve…

Read More Read More

What are Zero Standing Privileges (ZSP)?

What are Zero Standing Privileges (ZSP)?

The problem Privileged Access Management (PAM) solutions seek to solve can be simply formulated: How do I appropriately provide and protect privileged access to my information technology assets? Traditional PAM solutions have focused on deploying controls on top of an enterprise’s existing identity practices, whether that’s providing password and session management for shared built-in administrator accounts or a password-of-the-day for personal privileged accounts. These approaches all rely on the same thing – protecting identities that permanently possess privileges on systems,…

Read More Read More

The Problem with PAM: Implementing Privileged Access Management Without the Pain

The Problem with PAM: Implementing Privileged Access Management Without the Pain

What Does PAM Mean To You? The term is not as straightforward as most people think… it has evolved over the years in parallel with the ever-changing security landscape. Take any combination of password management, least privilege, and session management, then throw in a smattering of role-based directory groups and you’ve kinda got it. The key misunderstanding though is that a PAM solution must come wrapped around a password vault. This is not to say that password vaults are not…

Read More Read More

Start a Free Stealthbits Trial!

No risk. No obligation.