Hitachi ID Systems rapidly becoming the 'Vendor of Choice' in Privileged Access Management Market
Privileged Access Management Deals Dominate First Quarter of 2013
Hitachi ID Systems, an analyst-recognized identity and access management leader, has closed the first quarter of 2013 with record sales and sales pipeline for its Privileged Access Manager [PAM] product. Global banking institutions and large companies around the world have purchased Hitachi ID privileged access management systems, some by replacing a leading privileged access management provider.
“Enterprises around the world are approaching us for a quickly-deployed, cost-effective, reliable and efficient privileged access solution,” says Gideon Shoham, CEO. “Often, we are selected to replace competing systems that were unable to meet our fast deployment pace, much lower total cost of ownership and the quality of our services.” “In several cases, Hitachi ID completed a full production-ready pilot in 2-3 months, compared to several years' invested in testing and piloting the leading competitive product,” noted Shoham.
As Andrew Kellett, Principal Analyst, Security with OVUM Group stated earlier in 2013, “(Hitachi ID)'s products, including Privileged Access Manager, address critical needs in the market for implementing fully audit-able secure access to privileged accounts.”
Interested companies can learn more about Hitachi ID's Privileged Access Management solutions on the website at http://Hitachi-ID.com/privileged-access-manager/ Download a white paper on best practices for securing privileged accounts at http://Hitachi-ID.com/privileged-access-manager/docs/privileged-access-management-best-practices.html or review a recent webinar recording on the subject at http://Hitachi-ID.com/cgi-bin/emaildoc?document=Best-Practices-for-Privileged-Access-Management.wmv
About Hitachi ID Systems, Inc.
Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud.
For more information please contact: