2022 gartner magic quadrant for privileged access management

INDUSTRY ANALYSIS

The Only Visionary in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

Ease of use & cloud optimization set Saviynt apart

Our cloud-native Privileged Access Management (PAM) solution was launched in 2019 as a fundamental rethinking of an outdated paradigm. And after simplifying security and privileged access for enterprises across the globe, we’ve been recognized as the only ‘Visionary’ in this year’s Gartner Magic Quadrant for PAM.

We believe Saviynt’s strengths include our:

  • Unified visibility and controls across identities, apps, and clouds, with real-time granular risk context.
  • Always-on cloud infrastructure entitlements management (CIEM) and cloud security posture management (CSPM) monitor for excessive access, unusual activity and configuration drifts.
  • Privileged account & entitlement discovery with just-in-time (JIT) access supports zero standing privilege (ZSP).
  • Automated discovery and accelerated onboarding of on-prem, IaaS and SaaS assets via intuitive setup wizard.

A Record of Innovation

We’re the only vendor who also holds the highest rating in Gartner Solution Comparison for Identity Governance and Administration1, with a score of 96 out of 100.

The Power of Convergence

Our PAM solution is one of several products in our converged Enterprise Identity Cloud platform. This unified approach helps organizations reduce risk, improve visibility, reduce TCO, and accelerate Zero Trust adoption—all while ensuring continuous compliance across their entire IT ecosystem.

Read the Report

Gartner® Magic Quadrant™ for Privileged Access Management​ by Michael Kelley, James Hoover, Felix Gaeftgens, and Abhyuday Data on July​ 20,​ 2022.

Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.1Gartner, Solution Comparison for Identity Governance and Administration, 28 May 2021, Homan Farahmand.

Schedule a Demo

Ready to see our solution in action?
Sign up for your demo today.

Sign Up for Event

The editors at Solutions Review highlight what’s changed in Gartner’s 2022 Magic Quadrant for Privileged Access Management and provide an analysis of the new report.

Analyst house Gartner, Inc.’s 2022 Magic Quadrant for Privileged Access Management has arrived. Gartner defines the privileged access management (PAM) market as a tool used to mitigate the risk of privileged access. In other words, accounts, credentials, and operations that offer an elevated (or “privileged”) level of access. PAM tools are used by machines (software) and by people who administer or configure IT Infrastructure. A PAM solution can be deployed as on-premises software, SaaS, or a hardware appliance.

Key core capabilities, according to Gartner, include the discovery of privileged accounts across multiple systems, infrastructure, and applications, credential management for privileged accounts, credential vaulting and control of access to privileged accounts, and session establishment, management, monitoring, and recording for interactive privileged access. Optional capabilities include delegation of access to privileged accounts, controlled elevation of commands, secrets management for applications, services, and devices, privileged task automation (PTA), remote privileged access for workforce and external users, and cloud infrastructure entitlement management (CIEM).

Gartner highlights the following providers in the privileged access management market: CyberArk, ARCON, Delinea, One Identity, BeyondTrust, WALLIX, Saviynt, Broadcom (Symantec), ManageEngine, Hitachi ID, and Netwrix.

In this Magic Quadrant, Gartner evaluates the strengths and weaknesses of 11 providers that it considers most significant in the marketplace and provides readers with a graph (the Magic Quadrant) plotting the vendors based on their ability to execute and completeness of vision. The graph is divided into four quadrants: niche players, challengers, visionaries, and leaders. At Solutions Review, we read the report, available here, and pulled out the key takeaways. This is not an in-depth analysis, only an observation of notable changes since the 2021 report.

CyberArk maintains its position at the top of the Leaders quadrant. CyberArk remains the biggest PAM brand, with a long history in this sector, and a wide geographic reach. CyberArk has a significant customer base across all major market regions and has introduce.d offline vault access for air-gapped environments this year. ARCON took itself from the bottom of the quadrant to just below CyberArk in the rankings. ARCON offers basic secrets management functionality with its application-to-application PAM tool, interfaces to Dev-Ops infrastructure tools, and CIEM. ARCON can deliver PASM functionality, through an appliance, software, self-managed, or SaaS. ARCON has made major strides in adding product capabilities within the last year, especially in secrets management, CIEM, and just-in-time functionality. Centrify and Thycotic, both Leaders in 2021, combined to form Delinea. Their combined efforts elevated Delinea in the Leaders quadrant. The merger of Thycotic and Centrify addressed a number of gaps in the respective product lines. Thycotic benefited from Centrify’s stronger PEDM and AD bridging functionality, and Centrify and Thycotic are able to solidify PASM functionality with the Thycotic vault. One Identity stays roughly in the one spot it was last year, while BeyondTrust moves down next to it. Former Challenger WALLIX moves into the Leaders Quadrant.

With WALLIX now in the Leaders quadrant, and senhasegura out of the rankings all together this year, there are no Challengers in 2022.

Sliding in as the only vendor in Visionaries sees Saviynt. Saviynt scored well for privileged access governance and administration, account discovery and onboarding, ease of deployment, administration and maintenance, and CIEM functionality. Unique to Saviynt, CPAM users get Saviynt IGA functionality for no additional cost.

In the Niche Players quadrant, Broadcom’s Symantec holds pole position. Symantec offers a very competitive PEDM product for Windows, Linux/UNIX and mainframe clients. Its performance and scalability, availability and recoverability capabilities are strong for PASM, including excellent clustering and high-availability features that support the addition of nodes without having to take a cluster down. Krontech is out this year, and is replaced by ManageEngine, Hitachi ID, and Netwrix. ManageEngine produces a number of enterprise management software tools, including its PAM product, PAM360. PAM360’s discovery capabilities are extensive, offering a wide range of scanning tools for finding privileged accounts on systems, databases, infrastructure and networks, and ease of deployment, administration and maintenance are areas in which ManageEngine is strong. Hitachi ID offers PASM (Privileged Account and Session Management) functionality through the Bravura Privilege product, a software-delivered PAM tool. Bravura Privilege has solid capabilities for discovery and credential management, including out-of-the-box connectors for service accounts, and excellent capabilities for managing credentials on endpoints that are not permanently connected. In 2021, Netwrix merged with Stealthbits, a producer of data security and privacy solutions. Most PASM functionality is provided by the Netwrix SbPAM product, and PEDM is provided by PolicyPak for Windows. Netwrix takes a unique approach toward the PAM market with a bring-your-own-vault approach, allowing the company to position itself as an enhancement to existing PAM tools as opposed to just a replacement for those tools.

  • Author
  • Recent Posts

Mike Costello is the Content Editor for Cybersecurity at Solutions Review. His work covers Endpoint Security, Identity Management, and SIEM. He is a professionally trained writer and storyteller with a solid foundation in working in many platforms— including print, web, and video. Adaptable, he consistently finds the right voice on various topics and delivers stories that grab your attention. You can reach him at mcostello at solutionsreview dot com.

Latest posts by Mike Costello (see all)

  • Identity Management and Information Security News for the Week of September 30; Updates from IDSA, Keyri, Laika, and More - September 29, 2022
  • Identity Management and Information Security News for the Week of September 16; Updates from Sumo Logic, SandboxAQ, Dig Security, and More - September 15, 2022
  • Identity Management and Information Security News for the Week of August 26; Updates from senhasegura, SecureAuth, Versa Networks, and More - August 25, 2022

Is CyberArk a PIM or PAM?

Cyber-Ark's PIM Suite is a full life cycle solution for centrally managing an organization's privileged accounts, users and sessions as well as embedded passwords found in applications and scripts.

Does Microsoft have a PAM solution?

PAM is based on new capabilities in AD DS, particularly for domain account authentication and authorization, and new capabilities in Microsoft Identity Manager. PAM separates privileged accounts from an existing Active Directory environment.

Is Okta a PAM?

Okta works with Privileged Access Management (PAM) partners to provide secure, user-friendly authentication and account provisioning.

What is included in the privileged access management?

Privileged access management (PAM) consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes, and systems across an IT environment.

Toplist

Latest post

TAGs