WINNER - Best Privileged Access Management: BeyondTrust
“Very excited by this, access management is tough to get right, and importantly, keep right! The coverage across the platforms is also a key fundamental which BeyondTrust appears to have resolved,” commented one judge on our winner’s submission. Others noted how it, “extends support to other OSes,” and praised its “good scope.”
The BeyondTrust Universal Privilege Management (UPM) portfolio is an integrated solution that provides visibility and control over all privileged access for any account and for virtually any use case. It is available as an on-premise and virtual appliance (private cloud), as well as a SaaS and PaaS hosted offering.
By uniting a broad set of privileged security capabilities, the platform simplifies deployments, reduces costs, improves usability, and reduces privilege risks, and empowers users to centrally secure and manage access across all environments, whether on-premise, hybrid, or cloud. These capabilities can be implemented as a standalone solution, with session auditing, least privilege management, and monitoring. Session logging allows review of all end system and network interactions, detailing remote and third-party users involved, which endpoints they connected to, and system information. It enables credential injection, eliminating the need for privileged users to remember or checkout credentials for the systems they need to access.
The CyberArk Privileged Access Management Solution was described by our judges as “going beyond basic Access Management by covering DevOps, IoT and robotic process automation.” They described it as, “a great solution to a very complex problem,” and said, “additional context around "non-human" identities was a great addition.”
The CyberArk Privileged Access Management Solution enables organisations to control, manage and audit non-human privileged access for applications, tools, containers and DevOps.It improves IT operational efficiency by automating the management and rotation of application credentials for applications running at scale. It also enforces internal and regulatory requirements for managing and monitoring application credentials and generates detailed audit trails.