BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Enterprise Password Management: The Hidden Cost of Scalability and Redundancy

July 2, 2018

  • Blog
  • Archive
Most IT teams have a repeatable process for evaluating software solutions — some use RFPs, others do research then rely on vendor demos and perhaps a proof of concept to validate the technology and functional requirements. Once you’ve determined the solution is a fit, the sales rep then provides the quote for the software licenses, maintenance, and implementation. And, of course, along with quote comes additional information that the IT team needs for implementation—product documentation, user guides, collateral, and deployment guides to give IT teams a sense of what it will take to get up and running. But when it comes to critical solutions like enterprise password security, IT teams also have two questions to consider: 1) can it scale? And 2), what do we need to do in order to ensure it never fails? The answers to those questions often mean the true cost of ownership is much higher than that quote you’ve received from the vendor’s sales representative. Consider, for example, your current infrastructure. Some commercial software solutions for privileged password and privileged session management have capacity requirements that could expand your infrastructure and server environment. During the Proof of Concept (POC) phase, or even if you began with a limited rollout, your hardware requirements may have been limited to 2-3 servers that were already in-house, hardened, and under-utilized. But once you move from a limited rollout to a full-scale deployment, the hardware requirements must be taken into consideration. Therefore, it’s important to understand the capacity of the software solutions in addition to the hardware requirements. If the privileged password management solution you’ve chosen wasn’t designed to scale and can therefore only handle 100 concurrent privileged sessions for each server, as you do the math you’ll soon see that an enterprise-wide rollout will require several additional servers. This is where BeyondTrust PowerBroker Password Safe can help. Deployed on a hardened appliance, it’s designed to operate in a scalable environment, with but with a smaller footprint. If your organization has 2000 admins – that means, you’ll track approximately 700 concurrent sessions. With PowerBroker Password Safe, that would be 3 UVM appliances total, including 1 for backup. And while we’re on the topic of servers, the next question to ask when considering privileged password and privileged session management solutions is about redundancy. How many fail-safes will be needed to ensure compliance with your organization’s redundancy/uptime policies? If your policy is to have 1 UVM for every 2 servers, you’ll need to budget and plan for up to 8 additional UVM servers in this scenario – what does that mean for your bottom line and for the total cost of ownership for the solution you select? Addressing hardware and redundancy often come up as topics late in the evaluation process – sometimes, too late. With PowerBroker Password Safe, you can rest assured that your privileged password management solution can scale to meet your organizations’ capacity and redundancy issues without blowing the budget. With consolidated appliances, it’s hardened and locked down, certified by Common Criteria, can be automatically updated, it can fit more sessions into a single appliance. To learn more tips and tricks about privileged password management solutions, join us for an upcoming webinar with industry expert Dr. Eric Cole, "Privileged Passwords are Easy Pickings for Attackers – Unless You Make These Fixes".
Photograph of Martin Cannard

Martin Cannard,

Martin has been helping organizations solve challenges in the privileged account management and identity and access management space for over 24 years. At Dell Software, Martin managed a team of Solution Architects, focused on designing and implementing solutions in the Privileged Account Management (PAM) space. Prior to joining Dell, Martin was Sr. Product Manager for Novell Privileged User Manager, a privilege management application acquired from Fortefi, an organization where he served as Vice President, Corporate Development. Prior to this, he was Program Manager of Client Technologies at Symantec where he was responsible for many ground-breaking field and channel enablement applications. Additionally, Martin managed the European QA group at Axent Technologies and has held various management positions in consulting, systems development, and operations. Martin is a regular speaker for security events, and webinars.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Capabilities to NIST SP 800-207

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.