“Avoid future sticker shock” with your Privileged Access Management Security Solution

Every cybersecurity strategy needs to evolve with the changing times. Gartner's Market Guide for PAM can help you build out your strategy.

By Michael Dullea, Senior Director of Product Management

Gartner recently published the Market Guide for Privileged Access Management (ID: G00315141), 2017. Gartner highlights the trends that are shaping the cybersecurity market and provides some recommendations in choosing the right solution.

Specifically, Gartner states “Avoid future sticker shock when extending deployments by planning ahead for evolving requirements over the next two to three years; and force vendors to provide pricing for expected features that you may need to buy.”

We believe that this is an important recommendation because:

  • It is important to plan a privileged access management (PAM) deployment with future requirements in mind. For example, having a 2/3 year roadmap is vital. A good practice to follow is to build a Maturity Model for your PAM deployment. This document shows such a maturity model and a deployment timeline to consider.
  • It is important to consider not just your initial cost, but what your total cost of deployment (license, hardware, HA, maintenance etc.) is over the life of your deployment journey.


Gartner also recommends that you should “Deploy session recording as soon as possible, because this capability will add accountability and visibility for privileged activity. Include this capability as part of your selection process.”

We believe this is again a very important recommendation because we have seen customers adopt a phased approach to deployment. While this is a good approach to deploying a solution, it can make the project expensive if the PAM solution is also procured piecemeal. So, buying the credential vault, session recording, policy management separately proves to be:

  • Cost prohibitive as you land up licensing each component and their corresponding HA needs separately
  • Increases time to value as it adds deployments cycles to obtain budget and go over the procurement process and approvals
  • Increases your deployment risks because of the differing deployment expertise necessary when you try to deploy each new functionality


In short, securing privileged access is critical as it helps reduce risks associated with high value accounts. It is important to think ahead and understand your future needs to ensure a successful deployment.

To learn more about interpreting the Gartner Market Guide for PAM, join us for this straightforward webcast.

Gartner Market Guide for Privileged Access Management, Feliz Gaehtgens, Anmol Singh, Dale Gardner, 22 August 2017

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


CA Community is the blog manager’s account used to post general updates and news items.


Modern Software Factory Hub

Your source for the tips, tools and insights to power your digital transformation.
Read more >
Low-Code Development: The Latest Killer Tool in the Agile Toolkit?What Are “Irresistible” APIs and Why Does Akamai's Kirsten Hunter Love Them?Persado's Assaf Baciu Is Engineering AI to Understand How You Feel