Key Criteria for Evaluating Privileged Access Managementv1.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. Privileged Access Management Primer
  3. Report Methodology
  4. Decision Criteria Analysis
  5. Evaluation Metrics
  6. Key Criteria: Impact Analysis
  7. Analyst’s Take
  8. About Alastair Cooke


Privileged Access Management (PAM) enables administrative access to critical IT systems, while minimizing the chances of security compromises through monitoring, policy enforcement, and credential management.

This report looks at the risks of staff or partners with more than standard user access and considers how a PAM solution can ensure these privileges are only used when and where appropriate. In it we explore how PAM solutions provide elevated access (such as server administration and security policy management), without revealing credentials.

Full content available to GigaOm Subscribers.

Sign Up For Free