| Our very own Michelin Star | | | For 2025, we proudly retained our Challenger position in the Gartner® Magic Quadrant™ for Privileged Access Management. | | | Gartner evaluates vendors using two essential criteria: | | | ● Ability to execute | | | ● Completeness of vision | | | This year, our placement moved even closer to the Leaders quadrant, reflecting steady product refinement, roadmap clarity, and growing customer adoption. | | | A complimentary copy of the report is available. Consider it the perfect starter as we look ahead to the next course in the PAM experience. | |
|
|
| | New additions to the menu | | | A variety of new capabilities are now ready to enjoy. Here is what was plated this year. |
| | | | PAM360 now includes Privileged task automation, powered by Qntrl Circuits. This addition allows privileged activities to run securely on demand or on a set schedule across your IT environment. | | | Tasks such as system configuration, software installation, file transfers, Active Directory operations, and log management can now be automated with minimal effort. Add the endpoint as a resource in PAM360, build the workflow in PTA, and run it securely with automated credential handling. Tasks can be triggered manually or set to run at defined intervals. | | | Read more |
| | | | This year, PAM360 introduced AI-powered capabilities through an integration that supports a Bring Your Own Key model. These insights help administrators review activity patterns faster and identify potential privilege risks with greater accuracy. | | | Here is what is now on the plate: | | | ● Risk remediation for cloud entitlements | | | Generate AWS inline policies that remove excessive permissions and apply just-enough access. The platform also provides clear summaries explaining what was removed and why. | | | ● Summaries for recorded sessions | | | Create AI-generated summaries for SSH and Telnet recordings, allowing faster review and understanding of privileged activity without replaying full sessions. | | | These intelligent additions support stronger governance, streamlined analysis, and better adaptation to changing security needs. | | | Explore the feature |
| | | | This year, we introduced the Application Gateway, a dedicated service gateway that allows PAM360 to securely manage privileged resources that are not directly reachable from the PAM360 server. It acts as a secure intermediary for environments such as DMZs, isolated network segments, and restricted subnets. | | | When deployed on a server with access to both PAM360 and the remote environment, the gateway supports resource discovery, credential management, password resets, and verification without affecting network segmentation or security posture. For large environments, multiple gateways can be deployed to distribute load and maintain stable performance. | | | Taste test now |
|
| The PAM Thought Leadership | | | Curious to explore the untold stories and deep insights of the identity security world from the comfort of your laptop screen? | | | Introducing the PAM Thought Leadership portal, a dedicated destination for thought leadership across access management, identity security, and everything that connects the two. This space is designed to serve curated articles, podcasts, videocasts, expert perspectives, and a growing library of resources focused entirely on privileged access management. | | | Fresh content will be added regularly, featuring industry voices, research-backed guidance, and practical intelligence for modern identity security. | | | Your table is already reserved. |
|
|
| | 2025 release radar | |  | | - Privileged Task Automation
- AI-powered Insights
- Application gateway
- Application Credential Injection viaPAM360 Remote Connect
- Session Recording for Website Connections
- Multi-Monitor Support for Remote Desktop Connections
- Inactive User Management
- Integration with Trident Hardware Security Module (HSM)
- macOS Agent in PAM360
|
| |  | - Periodic Password Integrity Check
- Certificates Management Enhancements
|
| |  | - Azure Application Integration
- Ticketing System Integration
- CMDB Integration
|
|
|
| |
| | 2026 and Beyond | | | Before we settle into last year’s tasting notes, the kitchen is already preparing the next menu. We are excited to share what is planned for the year ahead and the future beyond it. | | | Preview from the PAM kitchen | | | Our goal remains simple: make your daily workflows smoother, strengthen your security posture, and reduce the pain of compliance. The roadmap ahead reflects this philosophy with care and intention. | | | Consider this your chef’s preview of the enhancements and innovations being prepared to make PAM smarter, more seamless, and more secure. | | | PAM360 Cloud | | | A cloud-first PAM experience that is easier to deploy, scale, and maintain. | | | CIEM for Microsoft Entra | | | Purpose-built controls for entitlement visibility, risk reduction, and least-privilege alignment in Azure environments. | | | Privileged access policies | | | With an all-new way to manage privileged access within PAM360, IT administrators will be able to set up customizable privileged access policies based on a set of predefined criteria. | | | View the complete roadmap |
|
|
| Conference corner | | | 2025 took us around the world, and meeting you in person was the highlight of our year. Every event, every conversation, and every customer story added new flavor to how we think about privileged access, identity security, and product evolution. | | | And just like any chef, we took those notes back to our kitchen. | | | Our 2026 event lineup is already simmering, and we can’t wait to meet you again, exchange ideas, explore new challenges, and continue refining the recipe for smarter, simpler, and more secure PAM. | | | Join us at an event near you |
|
|
| | And here's your dessert! | | | From navigating cost calculations to streamlining implementation, our resource library serves as your trusted guide to understanding how PAM can simplify, strengthen, and support your security strategy. | |  | | | Ensuring compliance with the NIS2 Directive using PAM | | | Learn more |
|  | | | How much does a PAM implementation really cost? | | | Learn more |
| |  | | | Not another one-size-fits-all PAM maturity model | | | Read now |
| |
| | | Access the resource library |
|
| | | From AI powering least-privilege strategies to identity security woven into daily workflows with a finishing sprinkle of compliance wisdom, here’s a podcast worth savoring. | | |
|
| |
| | That's that! | | | If you’ve stayed with us till the last bite, thank you. Have thoughts, cravings, or content requests for the next edition? We’re all ears. | | | Until then, may 2026 keep you and yours satisfied. | | Cheers, The ManageEngine PAM team |
| |
|
|