Cover Image
市場調查報告書

決策矩陣:特權的ID管理解決方案的選擇 (2015∼2016年)

Ovum Decision Matrix: Selecting a Privileged Identity Management Solution, 2015-2016

出版商 Ovum, Ltd. 商品編碼 355518
出版日期 內容資訊 英文 46 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
決策矩陣:特權的ID管理解決方案的選擇 (2015∼2016年) Ovum Decision Matrix: Selecting a Privileged Identity Management Solution, 2015-2016
出版日期: 2015年11月03日 內容資訊: 英文 46 Pages
簡介

在任何一個組織中,最危險的用戶是有可訪問對企業最貴重且要求慎重使用的資料資產特權的用戶。

本報告提供技術,市場定位,實行能力,各服務的整體成熟度比較等為基礎主要特權的ID管理解決方案的考察相關資料,為您概述為以下內容。

第1章 摘要

  • 概要
  • Ovum的見解
  • 主要調查結果

第2章 供應商解決方案的選擇

  • 總括標準
  • 除外標準
  • 調查手法
  • Ovum的等級
  • Ovum的決策矩陣、互動

第3章 市場與解決方案分析

  • 決策矩陣:特權的ID管理 (PIM) (2015∼2016年)
  • 市場領導:供應商解決方案
  • 市場挑戰者:供應商解決方案
  • 市場模仿者:供應商解決方案
  • 新興供應商

第4章 市場領導

  • 市場領導:技術
  • 市場領導:實行
  • 市場領導:對市場的影響

第5章 供應商分析

  • Balabit「Shell Control Box」 (Ovum建議:模仿者)
  • BeyondTrust「Privileged Identity Management Portfolio」 (Ovum建議:挑戰者)
  • CA Technologies「Privileged Identity Manager Product Suite」 (Ovum建議:領導者)
  • Centrify「Server Suite 2015 and Privilege Service」 (Ovum建議:挑戰者)
  • CyberArk「Privileged Account Security Solution」 (Ovum建議:領導者)
  • Dell「Dell One, Privilege Management」 (Ovum建議:挑戰者)
  • Hitachi ID「Privileged Access Manager」 (Ovum建議:領導者)
  • IBM Security「Privileged Identity Manager」 (Ovum建議:挑戰者)
  • Lieberman「Enterprise Random Password Manager」 (Ovum建議:領導者)
  • Oracle「Privileged Account Manager」 (Ovum建議:模仿者)

第6章 附屬資料

  • 調查手法
  • 相關報告書
  • 著者
目錄
Product Code: IT0022-000526

Within any organization, the most dangerous users are those with privileged access to the company's most valuable and sensitive data assets. This Ovum Decision Matrix provides in-depth analysis of the leading Privileged Identity Management solutions. It compares their technology, their market positioning, their ability to execute, and the overall maturity of each offering.

Highlights

  • Businesses have seen the damage a rogue user with admin rights can cause. Their recent experiences of data breaches that have exploited privileged credentials is leading IT security teams to take a closer look at PIM technology.
  • Understand that there are three main vendor groups competing in the PIM arena: specialists, point solution providers, and IAM platform vendors.
  • Understand why PIM extends beyond controlling small groups of systems administrators and how it addresses enterprise data protection.

Features Benefits

  • Understand that there are three main vendor groups competing in the PIM arena: specialists, point solution providers, and IAM platform vendors.
  • Understand why PIM extends beyond controlling small groups of systems administrators and how it addresses enterprise data protection.
  • Understand why external parties including partners, contractors, and third-party service providers must have their access rights controlled.

Questions Answers

  • What are the three main vendor groups competing in the PIM arena?
  • How does PIM extend beyond controlling small groups of systems administrators and how it addresses enterprise data protection?

Table of Contents

1. Summary

  • Catalyst
  • Ovum view
  • Key findings

2. Vendor solution selection

  • Inclusion criteria
  • Exclusion criteria
  • Methodology
  • Ovum ratings
  • Ovum Decision Matrix Interactive

3. Market and solution analysis

  • Ovum Decision Matrix: Privileged Identity Management (PIM), 2015-2016
  • Market leaders: vendor solutions
  • Market challengers: vendor solutions
  • Market followers: vendor solutions
  • Emerging vendors

4. Market leaders

  • Market leaders: technology
  • Market leaders: execution
  • Market leaders: market impact

5. Vendor analysis

  • Balabit - Shell Control Box (Ovum recommendation: Follower)
  • BeyondTrust - Privileged Identity Management Portfolio (Ovum recommendation: Challenger)
  • CA Technologies - Privileged Identity Manager Product Suite (Ovum recommendation: Leader)
  • Centrify - Server Suite 2015 and Privilege Service (Ovum recommendation: Challenger)
  • CyberArk - Privileged Account Security Solution (Ovum recommendation: Leader)
  • Dell - Dell One, Privilege Management (Ovum recommendation: Challenger)
  • Hitachi ID - Privileged Access Manager (Ovum recommendation: Leader)
  • IBM Security - Privileged Identity Manager (Ovum recommendation: Challenger)
  • Lieberman - Enterprise Random Password Manager (Ovum recommendation: Leader)
  • Oracle - Privileged Account Manager (Ovum recommendation: Follower)

6. Appendix

  • Methodology
  • Further reading
  • Authors

List of Figures

  • Figure 1: Ovum Decision Matrix: Privileged Identity Management 2015-2016
  • Figure 2: Expanded view of Ovum Decision Matrix: Privileged Identity Management 2015-2016
  • Figure 3: Ovum Decision Matrix: Privileged Identity Management (PIM) 2015-2016 - Market leaders - technology
  • Figure 4: Ovum Decision Matrix: Privileged Identity Management (PIM) 2015-2016 - Market leaders - execution
  • Figure 5: Ovum Decision Matrix: Privileged Identity Management (PIM) 2015-2016 - Market leaders - market impact
  • Figure 6: Balabit - Shell Control Box
  • Figure 7: BeyondTrust - Privileged Identity Management Portfolio
  • Figure 8: CA Technologies - Privileged Identity Manager Product Suite
  • Figure 9: Centrify - Server Suite 2015 and Privilege Service
  • Figure 10: CyberArk - Privileged Account Security Solution
  • Figure 11: Dell - Dell One, Privilege Management
  • Figure 12: Hitachi ID - Privileged Access Manager
  • Figure 13: IBM Security - Privileged Identity Manager
  • Figure 14: Lieberman - Enterprise Random Password Manager
  • Figure 15: Oracle - Privileged Account Manager
Back to Top