Research Digs into Privileged Access Management Capabilities and Challenges


Traditionally, workers relied on IT teams to provide privileged access to the resources needed to perform tasks. Today, workers demand unprecedented rights to perform tasks on servers, applications, data, and other IT resources. While privileged access can increase user freedom and productivity and reduce administrative efforts and costs, security requirements are rarely a consideration. The key is to determine how to provide privileged access while minimizing risk.

ESG recently conducted a survey to identify core requirements for privileged account management (PAM), as well as common challenges that must be overcome. The first step to effective PAM is recognizing its importance, and 79 percent of respondents consider PAM to be very or critically important. Not surprisingly, the top reason for emphasizing PAM is the need to protect sensitive business data.

However, 76 percent of respondents said violations of their PAM policies had been reported during the previous year. Such violations directly led to security breaches in 39 percent of organizations. Other problems included:

  • Unexpected server failures and problems (31 percent)
  • Compliance issues (29 percent)
  • Privileged access granted to an unauthorized account (25 percent)
  • Unexpected endpoint failures (21 percent)
  • Damage to the organization’s reputation (9 percent)

These issues can cause financial losses and put companies out of business. On average, admins spend nine hours dealing with the fallout of each privileged access breach. The average cost is $5,500 for each violation, while 11 percent of respondents said they had to shell out more than $100,000.

A primary goal of PAM is to ensure privileged access is granted only for the time required to perform certain tasks. However, 41 percent of respondents said users retained privileged access credentials longer than they were supposed to be permitted to do so. The ability to automatically expire privileged access after a task is complete was identified as the most important capability of a PAM solution. This not only reduces risk but minimizes the time and cost involved with tracking and manually revoking credentials. Other important capabilities include detecting new privileged access accounts, controlling privileged access on applications and endpoints, and detecting unusual activity with such accounts.

The CyberArk Core Privileged Access Security platform is designed to protect, monitor, and control privileged accounts in on-premises, cloud, and hybrid environments. Privileged account credentials, including passwords, SSH keys, and other “secrets,” are stored in a central repository to prevent loss, theft, or unauthorized sharing. Passwords can be automatically rotated based on security policies to enhance security without impacting the production environment.

Privileged user sessions can be monitored and recorded in real time and, if suspicious activity or malware is detected, can be automatically suspended or terminated. With CyberArk, admins always have visibility into what privileged accounts exist, who has access to them, how those accounts are used, and for how long. Reports with full audit trails can be generated to demonstrate compliance.

Clango’s CyberArk-certified engineers and security experts can help you integrate CyberArk solutions into your environment and ensure they align with your processes and workflows. Let us show you how the CyberArk Core Privileged Access Security platform minimizes the risk associated with privileged access without disrupting the user experience.


For more information about CyberArk’s Core Privileged Access Security platform, please send us an email at (

Comments Closed.