Compare and Evaluate

Privileged Access Management

Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources. Subcategories of PAM include shared access password management, privileged session management, vendor privileged access management and application access management.

The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

These include:

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Product Feature Evaluations

The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

These include:

  • Strategy and Innovation
  • Service Experience
  • Conflict Resolution
  • Product Impact
  • Negotiation and Contract

Still need assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Latest Research

Privileged Access Management (PAM) Misconceptions: Starting the Journey
July 10, 2020

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations. In the world of the new normal, infrastructure investments are growing as a result of realized value and the pursuit of innovation, with IT leading the way. IT modernization investments include cloud technology, robotics, IoT, and automating tasks and processes. However, this modernization of IT presents additional opportunities for attackers to uncover security vulnerabilities.

Author: William Wong (Info-Tech)

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution
July 10, 2020

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.

Author: Shastri Sooknanan (Info-Tech)

See All Research

Privileged Access Management Products

Filter by:

Centrify Corporation

Centrify Zero Trust Privilege Services

Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

ARCON Company

ARCON PAM

ARCON | Privileged Access Management (PAM) offers enterprise IT security, risk and compliance management teams with necessary safeguards to securely manage the lifecycle of privileged accounts. A highly scalable and enterprise-class solution, ARCON | PAM seamlessly works in all IT environments to secure privileged accounts. The solution implements the best privilege access management practices to build a foundation for robust identity and access control IT architecture.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

BeyondTrust Corporation

BeyondTrust

BeyondTrust Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Symantec

Symantec PAM

Symantec Privileged Access Management can minimize the risk of data breaches by continually protecting sensitive administrative credentials, controlling privileged user access, and monitoring and recording privileged user activity across virtual, cloud, and physical environments.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

CyberArk Software Ltd

Core Privileged Access Security

The Core Privileged Access Security Solution unifies Enterprise Password Vault, Privileged Session Manager and Privileged Threat Analytics to protect an organization’s most critical assets.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Devolutions

Devolutions PAM

Diminish the risk of insider threats and cyberattacks while providing audit and compliance requirements for your team.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Ekran System

Ekran Systems PAM

With Ekran System PAM, you can, secure access to your Active Directory environment, specify endpoints that can be accessed by particular privileged users, limit the time for which access is granted, deliver temporary credentials to specified users and groups and automatically generate, encrypt, and manage credentials of privileged users.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Fudo Security

Fudo PAM

Intelligent PAM with unmatched session management.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Hitachi ID Systems

Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager secures access to high risk accounts and groups. It eliminates shared and static passwords and enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating forensic-level accountability.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

IBM

IBM Security Secret Server

IBM Security Secret Server makes it easy to identify and secure all service, application, administrator, and root accounts across the enterprise. Through continuous discovery, curb privileged account sprawl and gain a full view of privileged access in the organization. IBM Secret Server is easy to use and fast to deploy, available both on-premises or in the cloud. With powerful password vaulting, auditing and privileged access control, IBM Secret Server empowers your security and IT ops teams to keep all types of privileged accounts safe.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Thycotic Software, LLC.

Thycotic

Enterprise-grade PAM solution available both in the cloud and on-premise. Discover, Manage, Provision, and delegate access to all Privileged Accounts from a central dashboard.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

ManageEngine

ManageEngine PAM360

PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, build a central console where different parts of IT management interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Micro Focus

Micro Focus NetIQ Privileged Account Manager

In a complex hybrid environment, uncovering every identity with elevated rights can be difficult or nearly impossible. NetIQ Privileged Account Manager enables you to identify which identities have elevated access across your entire environment and what dependencies exist, giving you the insight you need to better simplify, implement, and manage policies around privilege.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

One Identity

One Identity Privileged Management

One Identity Privileged Access Management (PAM) solutions mitigate security risks and enable your organization to achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access. Our PAM solutions enable you to provide the full credential when necessary or limit access with granular delegation for least-privileged access. The result is enhanced security and compliance with more efficient administration and governance of privileged access.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Osirium Ltd.

Osirium PAM

Privileged Access Management and Automation to protect vital IT assets and securely automate business and IT processes.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

senhasegura

senhasegura

senhasegura is a privileged access management software solution that stores, manages and monitors all credentials, such as passwords, SSH keys and digital certificates, in a secure digital vault. Using encryption mechanisms, the password vault offers users the ability to use only one password to access a series of credentials registered in the solution. Additionally, senhasegura can be used to access all network resources through SSH and RDP protocols, storing all records of their use for audit and compliance analysis purposes. Its intelligence allows for real-time analysis of actions taken by users and alert generation to identify fraud or inappropriate action.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

WALLIX

WALLIX Bastion

Centralized control and monitoring of privileged access to sensitive assets. Secure your strategic data and critical assets. Ensure protection of your infrastructure against cyber risks.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Xton Technologies LLC

Xton Access Manager

With Xton Access Manager’s Privileged Account Management, ensure all access (passwords, keys, certificates, documents and more) to privileged accounts are kept safe, secure and out of the reach of these threats, both internal and external. With strong password requirements, auto-resets and “no password access” built into its core, rest easy that you are taking the appropriate steps to enforce IT security.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

RSA

RSA SecurID Suite

RSA SecurID Suite enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID Suite provides unified visibility and control across organizations’ many islands of identity.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

All Research

Privileged Access Management (PAM) Misconceptions: Starting the Journey
July 10, 2020

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations. In the world of the new normal, infrastructure investments are growing as a result of realized value and the pursuit of innovation, with IT leading the way. IT modernization investments include cloud technology, robotics, IoT, and automating tasks and processes. However, this modernization of IT presents additional opportunities for attackers to uncover security vulnerabilities.

Author: William Wong (Info-Tech)

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution
July 10, 2020

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.

Author: Shastri Sooknanan (Info-Tech)