Research Report

2020 Spotlight Report on Privileged Access

Vectra research shows that privileged access from unknown hosts occurs inside every industry, leading to unintended exposure of critical systems. Yet these privileged accounts rarely receive direct oversight or technical control of how they are used, even when privileged access management tools are in place. It is this lack of oversight or understanding of how privileged accounts are being used that creates the operational and financial risk for organizations. If used improperly, privileged accounts have the power to cause much damage, including data theft, espionage, sabotage, or ransom.

2020 Spotlight Report on Privileged Access
2020 Spotlight Report on Privileged Access
Instant Complimentary Access
Instant Complimentary Access

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Oops! Something went wrong while submitting the form.
Instant Free Access
Oops! Something went wrong while submitting the form.
2020 Spotlight Report on Privileged Access

Trusted by experts and enterprises worldwide