On December 3, 2018 Gartner released The Magic Quadrant for Privileged Access Management, Q4 2018. Evaluating 14 vendors, Gartner positioned Centrify in the LEADERS quadrant.
Here at Centrify, we believe this is a strong validation of Centrify’s Zero Trust Privilege approach to privileged access management. A complimentary version of this report is available for download here.
As breaches and attacks grow, the market is finally realizing that importance of PAM not just for compliance, but as a strong security control. At Gartner’s Security and Risk Management Summit in June 2018, Neil MacDonald noted in the keynote that PAM was one of the Top 10 security projects for 2018[i] and estimates that it is the #3 fastest growing information security segment.[ii]
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Gartner predicts that, “by 2022, more than half of enterprises using privileged access management (PAM) tools will emphasize just-in-time privileged access over long-term privileged access, up from less than 25% today.”[iii]
CENTRIFY A LEADER
For this Magic Quadrant, Gartner evaluated 14 key vendors for ability to execute and completeness of vision.
We emphasize that Centrify was the first to offer PAM-as-a-Service with flexible deployment offerings to also be customer-managed in your own datacenter. Centrify continues to be the only true cloud-architected, multi-tenant PAM offering on the market today.
In addition, we are confident that Gartner recognized Centrify’s ability to provide Active Directory bridging for UNIX/Linux systems, one of our most popular capabilities and one we are most known for.
“Gartner predicts by 2021, over 50% of organizations using DevOps will adopt PAM-based secrets management products, rising rapidly from less than 10% today.”
NEW ATTACK VECTORS
Finally, we believe our positioning in the Leader quadrant is strongly driven by securing privileged access to new attack vectors like DevOps that – along with others like cloud environments, Big Data, containers and microservices – require that customers adapt from legacy PAM to new cloud-ready Zero Trust Privilege.
Gartner states, “privileged access management is one of the most critical security controls, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.”
Not only has the attack surface changed, but so have the attackers. We now all live in a world of Advanced Persistent Threats (APTs) that create a growing and changing risk to organizations’ financial assets, intellectual property and reputations. Expanding access and obtaining credentials is an essential part of most APTs, with privileged access being the crown jewels. Hackers no longer hack in; they simply login…with compromised credentials.
For more information on Centrify’s Zero Trust Privilege services, click here.
[ii] Gartner Forecast Analysis: Information Security, Worldwide, 2Q18 Update, Authors: Ruggero Contu, Deborah Kish, Christian Canales, Sid Deshpande, Elizabeth Kim, Dale Gardner, Sept 24, 2018
[iii] Gartner Magic Quadrant for Privileged Access Management, Authors: Felix Gaehtgens, Dale Gardner, Justin Taylor, Abhyuday Data, Michael Kelley, Dec 3, 2018
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Centrify at https://www.centrify.com/solutions/privileged-access-management/2018-gartner-mq-pam/