• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
kron
4.8
104 Reviews (All time)
Review weighting


Browse Kron Reviews

Kron is present in 2 markets with 2 products. Kron has 104 reviews with an overall average rating of 4.8.

Data Masking (Transitioning to Data Masking and Synthetic Data)

Data masking is based on the premise that sensitive data can be transformed into less sensitive but still useful data. This is necessary to satisfy application testing use cases that require representative and coherent data, as well as analytics that involve the use of aggregate data for scoring, model building and statistical reporting. The market for data protection, DM included, continues to evolve with technologies designed to redact, anonymize, pseudonymize, or in some way deidentify data in order to protect it against confidentiality or privacy risk.

Kron has 1 product in Data Masking (Transitioning to Data Masking and Synthetic Data) market
  • Kron Dynamic Data Masking
    5.0
    4 Reviews

Privileged Access Management

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines five distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, cloud infrastructure entitlement management (CIEM) and remote PAM (RPAM). Privileged access is access beyond the normal level granted to both human and machine accounts. It allows users to override existing access controls, change security configurations, or make changes affecting multiple users or systems. As privileged access can create, modify and delete IT infrastructure, along with company data contained in that infrastructure, it presents catastrophic risk. Managing privileged access is thus a critical security function for every organization and requires a specific set of procedures and tools. PAM tools focus on either privileged accounts or privileged commands.

Kron has 1 product in Privileged Access Management market
  • Kron PAM
    4.8
    100 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©