I rate this solution an eight out of ten. The solution is suitable for larger companies and will be suitable for government entities, large groups, or banks. It's an enterprise solution and not for small companies. It may be suitable for medium companies if they have any compliance issues. For example, if they work in a specific sector or have a certification like ISO 27001, they will need to invest in it. Some products require installation while others do not. It is the approach each vendor takes in building the architecture of their product. Most encryption occurs on the hardware if the customer has appliances. BeyondTrust has a different approach, so we find Safeguard more flexible than BeyondTrust. Regarding advice, each customer needs to build their use cases and determine future trends very carefully. They need to decide whether or not they want to scale up or if their business is changing. They can view reports and see specific metrics and frameworks. We show them if they need a light or deep solution. For example, if you have a PAM solution and later implement an IGA solution, it increases integration costs because you have to integrate both solutions. It is also important to see which technology is suitable for them. For example, if a customer tells us that they have Identity Manager from One Identity for an IGA solution and are looking at PAM, I will advise them to go with Safeguard. That will save them $50,000 in integration because it's an out-of-the-box integration. Both products are from the same vendor and work seamlessly.
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
I rate this solution an eight out of ten. The solution is suitable for larger companies and will be suitable for government entities, large groups, or banks. It's an enterprise solution and not for small companies. It may be suitable for medium companies if they have any compliance issues. For example, if they work in a specific sector or have a certification like ISO 27001, they will need to invest in it. Some products require installation while others do not. It is the approach each vendor takes in building the architecture of their product. Most encryption occurs on the hardware if the customer has appliances. BeyondTrust has a different approach, so we find Safeguard more flexible than BeyondTrust. Regarding advice, each customer needs to build their use cases and determine future trends very carefully. They need to decide whether or not they want to scale up or if their business is changing. They can view reports and see specific metrics and frameworks. We show them if they need a light or deep solution. For example, if you have a PAM solution and later implement an IGA solution, it increases integration costs because you have to integrate both solutions. It is also important to see which technology is suitable for them. For example, if a customer tells us that they have Identity Manager from One Identity for an IGA solution and are looking at PAM, I will advise them to go with Safeguard. That will save them $50,000 in integration because it's an out-of-the-box integration. Both products are from the same vendor and work seamlessly.
I would rate Privileged Access Suite seven out of ten.
I would rate this solution an eight out of ten.