User Insights on Cost and Complexity – Research finds traditional PAM solutions are too complex with 68% of organizations paying for wasted features.
Keeper Security and TrendCandy Research surveyed over 400 IT and security professionals to explore the common challenges that organizations face with their current Privileged Access Management (PAM) solutions. The results are conclusive. Not only are major components of traditional PAM solutions not being used, but many respondents admit to never fully deploying the solutions they paid for.
This report was commissioned to gain insights and data on feedback that we’ve heard from countless IT and security professionals – that traditional PAM solutions are overly complex, costly and difficult to maintain. Our research clearly demonstrated that most of these traditional PAM solutions are falling short.
PAM users indicate that the desire and need for a simple solution is pervasive. Some findings include:
87% of respondents say they would prefer a “pared down” for of PAM that is easier to deploy and use.
On average, IT teams only use 62% of their current PAM functionality. 58% of respondents agree there is waste in their PAM solution.
Roughly two-thirds of survey respondents indicate that pricey and superfluous PAM features create too much complexity for users, reducing user satisfaction.
More than half of all IT teams – 56% – report they tried to deploy a PAM solution but never implemented it. Of those, 92% said it was because their PAM solution was too complex.
Most organizations – 85% – say their PAM product requires a dedicated staff to manage and maintain.
Two-thirds of IT leaders – 66% – say they need a better PAM solution, but 58% say they do not have one because it is too expensive.
With the current, ever-changing security climate, it is essential that all organizations have the right controls in place. This includes privileged password management, secrets management and session management.
Based on the survey results, the top five benefits IT leaders seek in a PAM solution include:
Managing and monitoring privileged user access
Protecting against compromise of privileged credentials by external threat actors
EPM enables organizations to securely manage, protect, discover, share and rotate passwords with full control and visibility to simplify auditing and compliance.
KSM delivers a fully-managed, cloud-based solution to secure infrastructure secrets such as API keys, database credentials, access keys and certificates.
KCM provides an agentless remote desktop gateway for instant privileged session management, remote infrastructure access and secure remote database access to RDP, SSH keys, database and Kubernetes endpoints – no VPN required.
Craig Lurey is the CTO and Co-Founder of Keeper Security. Craig leads Keeper’s software development and technology infrastructure team. Craig and Darren have been active business partners in a series of successful ventures for over 20 years. Prior to building Keeper, Craig served at Motorola as a software engineer creating firmware for cellular base station infrastructure and founded Apollo Solutions, an online software platform for the computer reseller industry which was acquired by CNET Networks. Craig holds a bachelor’s degree in Electrical Engineering from Iowa State University.
Get the latest cybersecurity news and updates sent straight to your inbox
Share this blog
You May Also Like
Six Ways To Prevent Privilege Escalation Attacks
Organizations need to prevent privilege escalation attacks to protect their sensitive data from unauthorized access. To prevent privilege escalation attacks, organizations should implement least privilege access, follow password security best practices, enforce Multi-Factor Authentication (MFA), keep...