Reason to Celebrate: CyberArk Named a Privileged Identity Management Leader

November 14, 2018 Katie Curtin-Mestre

Independent research firm Forrester Research today released The Forrester Wave™: Privileged Identity Management, Q4 2018.1 For the report, Forrester evaluated the 11 most significant privileged identity management vendors and identified CyberArk as a Leader.

In our opinion, privileged identity management is crucial to strengthening an organization’s security posture and improving risk management.  According to the report, “The [CyberArk] solution has strong password safe, session management, and privileged threat analytics, as well as the broadest DevOps support of any vendor evaluated in the Forrester Wave.”

CyberArk ranks highest in the “Current Offering” and “Market Presence” categories and received the highest possible score for criteria including customer satisfaction, cloud and DevOps support, privileged threat/behavior analytics, privilege delegation and escalation, privileged session monitoring and container support plans, among others.

The CyberArk Privileged Access Security Solution is the most comprehensive solution on the market when it comes to protecting privileged accounts, credentials and secrets at the endpoint, on-premises, on the hybrid cloud and in DevOps environments.

We are proud to be named a Leader by Forrester. This milestone represents a great opportunity to thank our customers and partners who continue turn to CyberArk as trusted advisor while rolling out modern infrastructure, improving business agility and driving new opportunities for growth.

To read the full report, The Forrester Wave™: Privileged Identity Management, Q4 2018, click here.

_______

1 – The Forrester Wave™: Privileged Identity Management, Q4 2018 by Andras Cser, November 14, 2018

Previous Article
The Big zBang Theory – A New Open Source Tool
The Big zBang Theory – A New Open Source Tool

CyberArk Labs is often asked to run risk assessments of target networks. This is similar to penetration tes...

Next Article
PAM vs. PIM: Privilege by Any Name Any Name Is a Priority
PAM vs. PIM: Privilege by Any Name Any Name Is a Priority

Privileged accounts, credentials and secrets – and the access they provide – represent the largest security...