Published: 15 April 2019
This summary contains input from fifteen members on use cases in the Privileged Access Management (PAM) solutions space. We begin this summary by examining if members have implemented a PAM solution within their organizations, their primary PAM vendors, and their rationales for selecting the vendor. We then analyze members' utilization of specific PAM modules, including their future plans to implement modules that are currently not utilized. We close this summary by examining regulations with which members need to comply and if they use PAM modules in their regulatory compliance processes.
Included in Full Research
Consult the Board Research Team