NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Gartner IAM Summit – More Privileged Access Management, More Alternatives, and More Fun!

December 16, 2015

  • Blog
  • Archive

privileged access management

Last week, BeyondTrust had a significant presence at the Gartner IAM Summit in Las Vegas. There were several takeaways from this important show, including:

  • Privileged Access Management (PAM) and Identity and Access Management (IAM) are getting more and more intertwined.
  • Customers with active PAM projects are tired of overpaying and want a less expensive, simpler alternative.
  • PAM is not just about passwords, although a few vendors certainly want you to believe that!

Let’s take a look at each of these takeaways in some more detail.

The intertwining of PAM and IAM

This really isn’t a new approach, but customers are starting to tackle more PAM and IAM projects together as the security and infrastructure teams in many enterprises begin to converge around core security concepts, such as least privilege and user access. A critical success factor for customers here will be to ensure they have flexibility in selecting their best of breed IAM and PAM partners, and not to be locked into a closed framework covering both (which won’t cover either very well).

This convergence was evidenced by the number of attendees (350!) at our Solution Provider Panel Session, titled, “Practical Advice: How to Add Privileged Account Management to Your Enterprise IAM Strategy” featuring security leaders such as David Tyburski, CISO, Wynn Resorts; Ernie Anderson, Principal, Booz Allen Hamilton; and Nick Cavalancia, Founder, TechVangelism.

The panel answered questions like:

  • Where did you start when it came to PAM? How did you prioritize?
  • How did you transition from PAM to IAM, or vice versa?
  • What lessons did you learn? What were the gotchas?
  • What is your 1-5 year IAM and PAM strategy?
  • What are the three things every CSO should consider before they begin a PAM project?

The record attendance at this session (orders of magnitude more than any other vendor with a session at that time, by the way!) is proof-positive that there are many questions yet to be answered on how to make PAM and IAM work together.

Next, let’s talk about alternatives

I personally had a dozen conversations – and my booth mates had many more – where an attendee would say something like, “I’ve got an active PAM POC going, and it’s not going well. There are surprises. It’s complex and expensive…” you get the idea. There are a couple of PAM vendors out there that are notoriously costly and complex, and customers are fed up. If you recall our Privilege Gone Wild study earlier this year, you likely remember that prospective customers worry most about the cost of CyberArk, Dell and CA. Watch for more on this soon!

Finally, PAM is more than just passwords

Although an important first step in gaining greater control and visibility over privileges, passwords are not the only challenge. Many one-dimensional “PAM” vendors out there are pushing their password-only option hard, to the detriment of customers. What happens when these customers want to expand their PAM coverage out to enforcing least privilege on endpoint management, or delegating access on Unix or Linux servers? Buy more best of breed and try to cobble it all together and hope it works out?

What customers are asking for is:

  • Both broad and deep privileged account management capability across every scenario in an integrated platform
  • Detailed reporting and privileged analytics for multiple stakeholders to mitigate security and compliance concerns and tighten up operational practices
  • Alignment with other security solutions, providing a more complete picture of IT risk management – not another silo to manage

Scott Carlson, Security Architect for PayPal, addressed these very issues in his excellent session, “Trust But Control: Managing Privileges Without Killing Productivity.”

Oh, and we had some fun, too

When in Vegas, right? Check out some the fun we had – in the booth, at sessions, and in our Martini’s and Moolah suite.

If we talked with you at the show, we want to continue to dialogue! Contact us today. If you need guidance on how to take your privileged account management deployment to the next level, check out our 7-step strategy for achieving complete privileged account management or read Gartner’s Twelve Best Practices for Privileged Access Management.

Photograph of Scott Lang

Scott Lang, Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.