Differences between traditional, on-premises Privileged Access Management (PAM) versus modern PAM delivered as-a- service?

March 2, 2023
|
Duration:

It is no secret that the cybersecurity landscape is one of constant change. Seemingly every day a new tool is released, or an older tool becomes obsolete.

While traditional on-premises privileged access management (PAM) solutions are not quite obsolete, they do have characteristics that do not necessarily lend themselves to today’s cybersecurity environment.

What is the difference between traditional PAM solutions and modern cloud-based PAM solutions?

Traditional PAM solutions are installed, managed and self-hosted on-premises, while modern PAM solutions are delivered via the cloud, commonly through a SaaS (Software-as-a-Service) delivery model. As an on-prem solution, traditional PAM comes with a unique set of challenges when compared to the cloud-hosted alternative, especially when considering that most organizations now have specific cyber insurance policy requirements.

What are the benefits and challenges associated with traditional, on-premises PAM solutions?

The benefits of self-hosting a PAM solution can include:

  • Greater control: When self-hosting a PAM solution, you have greater control over the configuration, management, and security of the solution. This allows for greater customization of the solution to meet your specific needs and requirements.
  • Improved security: Self-hosting a PAM solution can improve your security posture by allowing you to implement your own security policies and controls. It can also ensure that an organization’s sensitive data is stored securely on-premises rather than in the cloud. However, many organizations don’t have the proper controls in place and may actually find more improvements in a cloud hosted solution.
  • Better performance: Self-hosted PAM solutions can provide better performance than cloud-based solutions as a result of more control over hardware and infrastructure. This is often of particular importance for organizations with large or complex environments.

The challenges of self-hosting a PAM solution can include:

  • High upfront costs: Self-hosting a PAM solution can require significant upfront costs, due to hardware, software, and infrastructure requirements.
  • Maintenance and support: Self-hosting a PAM solution requires ongoing maintenance and support. This includes installing updates and patches, troubleshooting issues, and ensuring that the infrastructure is functioning properly. This can be time-consuming and require specialized skills and knowledge.
  • Security risks: With self-hosting, the organization is responsible for ensuring the security of the PAM solution, which can be challenging. If security protocols are not properly configured or maintained, it can lead to vulnerabilities and expose the organization to increased risk.
  • Scalability limitations: Self-hosted solutions can have limitations in terms of scalability. If an organization is growing rapidly or needs to accommodate additional users, devices, or applications, additional infrastructure and hardware investments may be required.
  • Time-consuming deployments: The deployment and configuration of a self-hosted PAM solution can be a lengthy process requiring a high level of technical expertise. This can easily cause delays in getting the solution up and running, which can impact productivity and time-to-value.

What are the benefits and challenges associated with a modern, cloud-based PAM solution delivered as a service?

The benefits of self-hosting a PAM-as-a-Service  can include:

  • Ease of deployment: Deployment is typically quick and easy. There is minimal hardware to set up and infrastructure to configure, as everything is managed by the service provider.
  • Scalability: PAM solutions delivered as a service can be more scalable than self-hosted solutions, as the service provider manages underlying infrastructure and ensures resources are allocated appropriately. This may be of particular importance for organizations with rapidly changing environments or those supporting a large user base.
  • Ongoing maintenance: Ongoing maintenance and updates are typically handled by the service provider, helping reduce the burden on IT and ensuring that the solution is always up-to-date and secure.
  • Predictable costs: When delivered as a service, PAM solutions typically function on a “Pay as you go” model with low total cost of ownership (TCO).
  • Integration with cloud services: PAM solutions delivered as a service can often be easily integrated with other services in your cloud environment, including identity and access management (IAM) solutions.

The challenges of utilizing a cloud-based PAM-as-a-Service can include:

  • Dependence on service provider: Similar to how organizations are dependent on their own IT to manage traditional PAM, organizations are dependent on the service provider for the availability and security of the PAM solution. This can introduce risks if the provider experiences service disruptions or a security breach of their own.
  • Limited customization: PAM services delivered as a service may have limited customization options, proving a challenge for organizations requiring specific features or integrations.
  • Data residency and compliance: PAM services delivered as a service may not be available in all regions, and there may be compliance concerns if data is stored outside of specific jurisdictions or regulatory frameworks. This could be of extra concern for organizations required to abide by regulations like the General Data Protection Regulation (GDPR).

3 notorious user experience shortfalls in a traditional on-premises PAM solution

PAM solutions that use a traditional on-prem approach have three shortfalls that negatively impact user experience and increase risk. These shortfalls can be overcome with cloud PAM solutions.

  • Password vaulting. PAM solutions that rely on vaulting passwords, like the root/domain admin use case, lead to a glaring issue - the access is always there and is always an attack surface. Even if the account is no longer needed or not actively in use, it sits as a potential doorway to be leveraged by attackers.
  • Proliferation of hardware requirements. Another area in which traditional PAM falls short is the proliferation of hardware requirements in the form of jump-boxes. This additional hardware requires administrative oversight and adds further complication, slowing down privileged users trying to do their jobs. When security solutions make work cumbersome, end-users find ways to circumvent them.
  • Discovery processes across the network. Traditional PAM does not adequately meet the needs of discovery processes across the network. As new servers and products get added, they require intervention to be integrated with the PAM solution. This is especially so with workstations where their ownership inventory changes often. Updating PAM manually does not scale, so assets get missed without proper discovery.

What to consider when choosing between self-hosted PAM and PAM delivered as a service

When deciding whether to use a self-hosted PAM solution or a PAM solution delivered as a service, there are several factors to consider:

  • Control: A self-hosted PAM solution provides more control over the deployment and management of the system, while a cloud-based PAM solution is managed by the vendor.
    • Ask yourself: “Do you need complete control over the PAM solution or are you comfortable delegating management to a third-party?”
  • Security: A self-hosted PAM solution can provide an extra layer of security since all data and access controls are managed and stored within your own network, but also properly configured maintained security protocols. On the other hand, a cloud-based PAM solution may provide the benefit of constant monitoring and patching by the vendor.
    • Ask yourself: “What are the security requirements of your organization and which option provides the level of security you need?”
  • Scalability: A cloud-based PAM solution can be easier to scale up or down as your organization grows or changes. With a self-hosted PAM solution, you may need to invest in additional infrastructure and hardware to accommodate changes in scale.
    • Ask yourself: “What is the growth potential of your organization and the level of scalability you require?
  • Technical expertise: A self-hosted PAM solution requires technical expertise in areas such as server management, security, and networking. If you do not have the necessary skills in-house, you may need to hire additional staff or contract with outside experts. A cloud-based PAM solution may require less technical expertise, but you may still need some level of expertise to manage and customize the system.
    • Ask yourself: “How much time does your staff have to devote to maintaining the solution? What is their level of technical expertise?”
  • Cost: A self-hosted PAM solution can be more cost-effective in the long run but may require a significant upfront investment in hardware and infrastructure. A cloud-based PAM solution may require ongoing subscription fees, but less upfront investment.
    • Ask yourself: “Do you prefer a larger upfront investment or a more predictable costs?”

Should your organization utilize a traditional on-premises or a cloud-hosted PAM solution?

Ultimately, when deciding between a self-hosted PAM solution and a PAM solution delivered as a service, the decision will come down to your organization's specific needs and requirements. There is no one-size-fits-all.

Self-hosted PAM solutions may be a better fit for larger, enterprise-level organizations that require extensive customizations, increased security, have complex compliance requirements, and have a large team of technically experienced staff to support the tool.

On the other hand, PAM solutions delivered as a service tend to better fit organizations that are more focused on scalability, predictable pricing, and lack a large staff for implementing and managing the solution.

As a solution-agnostic company, MajorKey offers advisory services built to help organizations of all sizes analyze their current situation and develop a PAM roadmap. If you’re interested in speaking to an identity security expert, feel free to contact us to set up a meeting.

Authors
No items found.

Recent Blogs

Blog

Redefining Efficiency and Reliability: How MajorKey Managed Operations Empowers Identity Programs

How MajorKey Managed Operations Empowers Identity Programs

Discover how MajorKey’s Managed Operations (MOps) empowers organizations to achieve secure, scalable, and outcome-driven identity management with expert guidance, automation, and 24/7 support. Learn how MOps streamlines operational efficiency, reduces risk, and drives measurable progress for modern identity programs.

Blog

Introducing NomadID: Mission-Ready Identity Management for Federal Agencies in DDIL Scenarios

Introducing NomadID: Mission-Ready Identity Management for Federal Agencies in DDIL Scenarios

NomadID by MajorKey Technologies is an Identity, Credentialing, and Access Management (ICAM) solution designed for Department of Defense (DOD) and federal agencies operating in Disconnected, Denied, Intermittent, Low-Bandwidth (DDIL) environments. It ensures uninterrupted authentication and single sign-on (SSO) capabilities even during network outages or hostile conditions, combining identity management, security monitoring, and governance locally at the edge to uphold security standards and maintain seamless access in challenging or disconnected scenarios.

Blog

Digital Trust Reimagined: How Verifiable Credentials and Face Check Help Stop Fraud and Streamline Security

Digital Trust Reimagined: How Verifiable Credentials and Face Check Help Stop Fraud and Streamline Security

Whether you're securing privileged access, enabling self-service recovery, or modernizing identity, MajorKey’s IDProof+ provides a proven defense against fraud and identity-based threats.

Blog

Mastering Non-Human Identity Management: Challenges, Strategies, and Executive Alignment

Mastering Non-Human Identity Management: Challenges, Strategies, and Executive Alignment

Non-human identities (NHIs) such as service accounts, bots, and API keys operate autonomously across IT environments but often lack proper provisioning, lifecycle management, and oversight, making them a critical security risk. Effective NHI management requires inventory and ownership clarity, strict access controls based on least privilege, automated lifecycle management, continuous monitoring, and executive alignment to reduce breach risks and ensure compliance.

Blog

Selling IAM to the Business: Speak Their Language, Not Yours

Selling IAM to the Business: Speak Their Language, Not Yours

Identity and Access Management (IAM) can be sold to business leaders effectively by focusing on business outcomes rather than technical jargon. Emphasizing benefits such as increased employee productivity through streamlined access, faster onboarding with automated provisioning, enhanced audit compliance with automated role management, improved customer loyalty via seamless and secure login experiences, and uninterrupted business operations by ensuring timely access to tools helps connect IAM to revenue growth, customer satisfaction, and operational efficiency.

Blog

Critical SharePoint On-Premises Zero-Day Vulnerability (CVE-2025-30556) Under Active Attack — Urgent Steps to Protect Your Systems Now

A critical zero-day vulnerability in Microsoft SharePoint Server on-premises, tracked as CVE-2025-53770 and nicknamed "ToolShell," is actively exploited, allowing unauthenticated attackers to execute arbitrary code remotely, potentially compromising entire servers and networks. Microsoft has released emergency patches and mitigation guidance, urging all users to apply updates immediately, enable advanced detection tools like Microsoft Defender, rotate ASP.NET machine keys, and strengthen access governance with Privileged Access Management (PAM) to protect against this severe threat.

Blog

Why IAM Projects Fail — And How to Flip the Script

Why IAM Projects Fail — And How to Flip the Script

Identity and Access Management (IAM) projects fail due to poor planning and stakeholder misalignment. Flip the script with proven success strategies.

Blog

From VPNs to Identity-Driven Access: The Microsoft Entra Global Secure Access Advantage

From VPNs to Identity-Driven Access: The Microsoft Entra Global Secure Access Advantage

Microsoft Entra Global Secure Access is a unified Security Service Edge (SSE) platform combining Microsoft Entra Private Access for secure, identity-based access to private applications and Microsoft Entra Internet Access providing cloud-based Secure Web Gateway and threat protection for internet and SaaS access. It enforces Zero Trust principles, centralizes policy management, enables continuous risk assessment, and delivers seamless, agentless user experiences, making it a modern replacement for traditional VPNs.

Blog

What is Harbor Pilot? An Intro to SailPoint’s New IAM AI Agent

What is Harbor Pilot? An Intro to SailPoint’s New IAM AI Agent

Harbor Pilot is SailPoint’s AI-driven Identity and Access Management (IAM) assistant. Discover how it streamlines identity decisions with automation.

Blog

Key Takeaways from Identiverse 2025

Key Takeaways from Identiverse 2025

Identiverse 2025 highlighted critical trends in identity and access management, including the urgent need for convergence between identity and network access, and the rise of AI agents and non-human identities (NHIs) as major security priorities. The conference emphasized that identity is now a central pillar of organizational strategy, requiring robust governance frameworks to manage AI agents and NHIs, which outnumber human identities by at least 20:1, and underscored the importance of identity resilience, continuous verification, and advanced technologies like behavioral biometrics and decentralized identity to restore trust in digital interactions.

Blog

The Evolution of IAM: Transforming from Security Necessity to Strategic Value Driver

The Evolution of IAM: Transforming from Security Necessity to Strategic Value Driver

Identity and Access Management (IAM) has evolved from a security tool to a strategic business enabler. Learn how modern IAM supports digital transformation.

Blog

5 Common Access Review Pitfalls (and How to Fix Them)

5 Common Access Review Pitfalls (and How to Fix Them)

Common access review pitfalls include overwhelming reviewers with too many simultaneous reviews, lack of context about why access is granted, manual processes causing inefficiencies, failure to enforce review outcomes, and involving the wrong stakeholders in the decision-making. Addressing these issues with prioritized, risk-based reviews, actionable insights, automation, enforced remediation, and involving knowledgeable business owners can greatly improve security, compliance, and audit readiness.

Blog

The Business Case for Lifecycle Workflows in Microsoft Entra ID

The Business Case for Lifecycle Workflows in Microsoft Entra ID

Lifecycle workflows boost IAM efficiency and reduce manual errors. Discover how automation drives ROI in identity governance.

Blog

Microsoft Entra ID Governance: What’s New and Why It Matters

Microsoft Entra ID Governance: What’s New and Why It Matters

Microsoft Entra ID Governance is an enterprise-grade identity governance solution integrated within the Microsoft Entra platform, designed to automate and streamline identity and access lifecycle management across cloud, on-premises, and hybrid environments. Recent updates include group Source of Authority conversion for cloud-based governance of legacy Active Directory groups, request and lifecycle governance with approval workflows, time-bound access controls, and integration with Microsoft Entra Verified ID for real-time identity verification, enhancing security, compliance, and operational efficiency.

Blog

Why Identity is the New Perimeter: Rethinking Security in a Cloud-First World

Why Identity is the New Perimeter: Rethinking Security in a Cloud-First World

Identity is now the perimeter in cloud-first security models. Learn how Identity and Access Management (IAM) defends against modern threats.

Blog

What We Learned at CyberArk Impact 2025

What We Learned at CyberArk Impact 2025

CyberArk Impact 2022 revealed trends in privileged access and zero trust. Get expert insights from the IAM frontlines.

No items found.
No items found.
No items found.