SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

Similar documents
On the Radar: Pulse Secure

SWOT Assessment: BMC Remedy v9

On the Radar: CipherCloud

SWOT Assessment: Alfresco, Alfresco One, v5.0

On the Radar: ForgeRock

Financial services perspectives on the role and real impact of cloud

On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept Product code: IT

Web Application Firewalls: The TCO Question

HP s revitalized workforce optimization suite is worth a fresh look

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product,

Case Study: Vitamix. Improving strategic business integration using IT service management practices and technology

On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access

How To Manage A Privileged Account Management

SWOT Assessment: FireMon Security Manager Suite v7.0

Enterprise Content Management: The Suite Perspective

2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity

The Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers

Winning with Emerging CRM Channels. An Ovum White Paper

SWOT Assessment: CoreMedia, CoreMedia 7

How To Understand The Implications Of Outsourced Testing

Secunia Corporate Software Inspector (Secunia CSI) ver.5.0

Windows Least Privilege Management and Beyond

PowerBroker for Windows Desktop and Server Use Cases February 2014

PowerBroker for Windows

Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution,

CA Service Management Solutions 14.1

How To Rank Customer Analytics Vendors

SWOT Assessment: dotcms dotcms v2.5

Data Center Automation: Market Landscape and Maturity Model

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

SWOT Assessment: Eccentex AppBase v5.0

QRadar SIEM 6.3 Datasheet

October Application Control: The PowerBroker for Windows Difference

ImageWare Systems, Inc.

List of Supported Systems & Devices

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution,

Privileged Identity Management for the HP Ecosystem

Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider,

How To Achieve Pca Compliance With Redhat Enterprise Linux

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

An Oracle White Paper January Oracle Database Firewall

HP Security Assessment Services

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Tufin Orchestration Suite

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience

The Critical Impact of Cloud for Insurance on Business Transformation

On the Radar: NextPlane

On the Case: HCL News Corp (News UK)

How Reflection Software Facilitates PCI DSS Compliance

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

On the Radar: Truphone

Privileged Session Management Suite: Solution Overview

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Privilege Gone Wild: The State of Privileged Account Management in 2015

An Oracle White Paper January Oracle Database Firewall

SECURE ACCESS TO THE VIRTUAL DATA CENTER

OSS/BSS market overview and vendor landscape, 2Q13-1Q14

IBM Tivoli Endpoint Manager for Security and Compliance

Implementing Managed Services in the Data Center and Cloud Space

DMZ Gateways: Secret Weapons for Data Security

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background

Ovum Decision Matrix: Selecting an Enterprise Content Management Solution,

How To Monitor Your Entire It Environment

DocAve Software Platform

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

PCI Requirements Coverage Summary Table

Secunia Vulnerability Intelligence Manager

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Privilege Gone Wild: The State of Privileged Account Management in 2015

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Transcription:

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett

Summary Catalyst The BeyondTrust PowerBroker Privileged Identity Management (PIM) product suite consists of five major components: PowerBroker Password Safe, PowerBroker for Unix & Linux, PowerBroker for Windows, PowerBroker Identity Services, and PowerBroker Management Suite. PIM has arrived at the top of the agenda of most security industry experts (CIOs, CISOs, and IT security managers) because business-focused cyber-attacks that steal data and damage reputations by using compromised user credentials are being launched against all types of organization. Key messages BeyondTrust offers a unified platform of privileged identity, account, and user management solutions. PowerBroker offers a single platform, but at the same time an identifiable product approach to password management, access control, and for monitoring, auditing, and controlling privileged user access User-selectable versions of PowerBroker are also available for the main operating system (OS) environments - Windows, Unix, Linux, and Mac OS BeyondTrust targets the complete privileged identity, account, and user management environment, but in some quarters it is still seen as more of a vulnerability management generalist. Ovum view PIM is now a top priority for enterprise security. CIOs, CISOs, and security managers recognize the need to deploy the technology and the levels of user and device protection it brings, yet only about 50% of enterprise organizations have some form of PIM protection in place. Those that have protection improve their chances of maintaining control over core business assets, including who can access them and how they are being used. Deploying the BeyondTrust privileged account management platform, which includes PowerBroker Password Safe, PowerBroker for Unix & Linux, PowerBroker for Windows, PowerBroker Identity Services (the Active Directory bridge), and PowerBroker Management Suite (for auditing and recovery), with the BeyondInsight central management console, provides the potential for an integrated, one-stop approach to privileged account management. This unified approach is a key differentiator for BeyondTrust as it competes in a security sector with PIM specialists that focus on specific elements of privileged identity, account, and user management, as well as all-rounders from the identity and access management (IAM) sector that see privilege management as a natural extension to their identity management interests. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 2

Recommendations for enterprises Why consider the BeyondTrust Privileged Identity Management Platform? The PowerBroker privileged account management platform provides technology solutions that can be tailored to meet the specific requirements of each client. A unified and integrated offering that includes all PowerBroker products and is delivered using the BeyondInsight central management console is available. Alternatively, organizations can select and license products separately in order to meet specific user and data protection requirements. SWOT analysis Strengths BeyondTrust is an established PIM provider For many years privilege management was considered to be the exclusive domain of a small band of security specialists. However, with annual growth rates of around 30%, it is fast becoming the must-have business-protection technology. BeyondTrust, with its unified platform approach, is one of a small number of vendors that offers end-to-end privileged identity, account, and user management protection. PowerBroker supports all mainstream Windows, Unix, Linux, and Mac OS environments The PowerBroker privilege management server maintains control over privileged and shared accounts for Unix, Linux, and Windows servers. Its desktop equivalent controls Windows and Mac OS admin privileges and maintains a least-privilege approach to managing usage and access rights. Permissions are rules-based and automated, using access rights that are linked to particular users and their roles, and can be elevated to meet the specific requirements of a particular task or project. Extensive audit, monitoring, and reporting services are available PowerBroker Password Safe provides automated password and session management facilities. It delivers real-time privileged session recording and audit using a proxy session monitoring service for secure shell (SSH) and remote desktop protocol (RDP). The solution uses native SSH and RDP as opposed to a Java client, and offers DVR-style playback. Its reporting services help address password protection and audit regulations for SOX, HIPAA, GLBA, PCI DSS, FDCC, FISMA, and other mainstream compliance mandates. Weaknesses The company s customer base is mainly located in North America BeyondTrust has more than 4,000 customers, with North America accounting for close to 80% of company revenues. This imbalance is being addressed with a strong sales pipeline in Europe and Asia-Pacific that has seen double-digit growth achieved when revenues are compared to the previous Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 3

year. However, this comes from a low base point and more work is needed if BeyondTrust is to become more of a global player. Messaging and product positioning should avoid confusion BeyondTrust is one of only a small number of vendors that is able to offer end-to-end privileged identity, account, and user protection. Yet its competitors still distract attention away from its privileged account management capabilities by positioning it as a generalist in vulnerability management. Opportunities The unified platform approach provides potential Because of its unified platform approach to the delivery of privileged identity, account, and user management services, BeyondTrust has the opportunity to offer its clients a consolidated view of user actions, highlighting privileged activity that bears further investigation. BeyondTrust has the monitoring, management, and access control technology and the behavioral and predictive analysis capabilities to detect, analyze, and report on the misuse of privilege. Integration of data from its vulnerability management products provides additional insights into threats and helps make decisions on privilege elevation. The market is opening up and growth is strong BeyondTrust is an established provider of privileged account management technology. It has the opportunity to build on its existing position and work with enterprise organizations that increasingly recognize the need for its privileged user and access control services. There are further opportunities to partner with identity management providers that are looking to add privilege management facilities to their existing offerings, and prefer to work with an established expert rather than develop their own solutions. Threats External as well as insider threat activity causes problems New IT security threats constantly appear on the radar. Vendors need to have the flexibility to adapt to the evolving threat landscape. BeyondTrust, along with its mainstream privileged management competitors, will need to continue to deal with new external threats and an insider threat market that is now focusing on privileged users and the overarching need to control their access rights. However, with its integration of privileged account management and vulnerability management, BeyondTrust may be well positioned to address these risks. The IAM sector brings additional competitive pressures The IAM sector offers technology partnership opportunities to leading privileged management providers such as BeyondTrust, but at the same time IAM platform vendors add an extra level of competition into what is rapidly becoming a crowded and highly competitive marketplace. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 4

Data sheet Key facts about the solution Table 1: BeyondTrust Product name PowerBroker Privileged Identity Management Portfolio Product classification Privileged account management Version number PowerBroker Password Safe, 5.5; PowerBroker for Unix & Linux, 9.0; PowerBroker for Windows, 6.7; PowerBroker Identity Services, 8.2; PowerBroker Management Suite, 4.0 Release date PowerBroker Password Safe, March 15; PowerBroker for Unix & Linux, May 15; PowerBroker for Windows, January 15; PowerBroker Identity Services, November 14; PowerBroker Management Suite, Jun 15 Industries covered All, but with particular focus on financial services, retail, healthcare, and the government sector Geographies covered All Relevant company sizes All Platforms supported Operating Systems: AIX IBMi (AS400), HP-UX, Linux, MAC OSX, Solaris, Windows Desktop, Windows Server Active Directory: Databases: Oracle, SQL Server, Sybase; Mainframes: RACF; Hypervisors: VMware vsphere API, VMware vsphere SSH; Hardware (routers, switches, networking, firewalls): Checkpoint, Cisco, Dell idrac, BIG-IP (F5), HP ilo, HP Comware, Juniper, Palo Alto Networks Languages supported English Licensing options Perpetual by users or devices and appliances Deployment options Physical or virtual appliances Routes to market Direct and via channel partners URL http://www.beyondtrust.c om/home/allproducts/ Company headquarters Phoenix, AZ, US European headquarters Leeds, UK Asia-Pacific headquarters Singapore Source: Ovum Appendix Methodology Ovum SWOT Assessments are independent reviews carried out using Ovum s evaluation model for the relevant technology area, supported by conversations with vendors, users, and service providers of the solution concerned, and in-depth secondary research. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 5

Further reading SWOT Assessment: Lieberman Enterprise Random Password Manager 4.83.8 SR3, Product code IT0022-000349 (April 2015) SWOT Assessment: BalaBit Shell Control Box, Version 4 F1, Product code IT0022-000368 (May 2015) SWOT Assessment: Hitachi ID Privileged Access Manager v9.0, Product code IT0022-000359 (May 2015) SWOT Assessment: CA Technologies Privileged Identity Manager Product Suite, Product code IT0022-000348 (May 2015) Author Andrew Kellett, Principal Analyst, Infrastructure Solutions andrew.kellett@ovum.com Ovum Consulting We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at consulting@ovum.com. Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 6

CONTACT US www.ovum.com analystsupport@ovum.com INTERNATIONAL OFFICES Beijing Dubai Hong Kong Hyderabad Johannesburg London Melbourne New York San Francisco Sao Paulo Tokyo Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 7