Top 5 Privileged Access Management (PAM) Tools
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 5 Privileged Access Management (PAM) Tools to help you decide which solution is best for you.
Users compare and give feedback on Privileged Access Management (PAM) Tools that they’ve used — based on product reviews, ratings, and comparisons.
#1 CyberArk Privileged Access Manager
CyberArk Privileged Access Manager was ranked as the #1 Privileged Access Management (PAM) Tool of 2022. PeerSpot users give CyberArk Privileged Access Manager an average rating of 8 out of 10.
A Security Lead at an insurance company says, "We've written over a hundred custom connectors ourselves that allow us to do all types of privileged session management for various applications. On top of that, the rest of the API-based central credential providers allow us to get away from credentials that may be hard-coded in the script or some application."
PeerSpot user Nigel M., Information Security Leader at a government, comments that the solution “Helps us quickly adapt and secure modern technology through integrations with solutions that we are moving toward or already had. We also use CyberArk’s Secrets Manager. Because AWS is the biggest area for us, we have accounts in AWS that are being rotated by CyberArk. We also have a manual process for the most sensitive of our AWS accounts, like root accounts. We've used Secrets Manager on those and that has resulted in a significant risk reduction, as well."
Miguel A., Security Advisory Services (SAS) Business Growth Lead for Iberia, explains, "It is a single tool that isolates possible kinds of malware. You get lateral movement blocking and auditing information, e.g., you know who is doing what. You are getting protections from the service as well as a useful environment. All your admins can easily go in and out of your company while accessing your servers in a secure way, even if they are working abroad."
#2 One Identity Safeguard
One Identity Safeguard was ranked as the #2 Privileged Access Management (PAM) Tool of 2022. PeerSpot users give One Identity Safeguard an average rating of 8 out of 10.
Cody E., Expert Systems Architect at Tempur Sealy International, Inc., says, "It has greatly helped improve our security posture. Safeguard has an option where it will reset passwords on service accounts, then go out to those servers where that service account is running as a service and update the password on it. That makes password changes very easy. We can regularly change passwords now and are planning on making it an annual activity, where all the people who own service accounts will go in and make sure all their passwords get changed, updated, and reset."
Another PeerSpot user, Information Security/Cybersecurity/VP, Cybersecurity Manager at a financial services firm, mentions, "It's one of the best products we've seen. When you start looking at the functionality and use cases and usability of the product, it's straightforward. They designed this product with the end-user in mind, and they also had the sysadmin who is supporting the product in mind. They really did a nice job. Overall, it's a nice product to work with."
A Director of Information Security at a healthcare company also says, "There are a lot of features, so it's going to sound funny, but one of the most simplistic features, the Favorites feature, is the one we like the best. You do a full run-through of configuration to check out a server and then you can save that whole configuration as a favorite. So the next time you go in, you click on the favorite that you configured and it automatically takes you to the end so you can check the server out that much faster. It saves a lot of time..."
#3 Delinea Secret Server
Delinea Secret Server was ranked as the #3 Privileged Access Management (PAM) Tool of 2022. PeerSpot users give Delinea Secret Server an average rating of 8 out of 10.
PeerSpot user Tor N., Executive Director at Semaphore, says, “One of the best things about Thycotic is that it is very easy-to-use. It is logical, it has well-designed screens and a nice GUI interface. It has good performance and is generally a pleasure to operate. It has excellent access management that can serve very large networks.”
IT Governance, Risk & Compliance at a tech services company mentions, "Its most valuable feature is its main purpose - the password changing and the Heartbeat so the user has access to only their SVN and does not have access to any other. Thycotic's access privileged management tool allows you to grant access to users for a specific period of time and with specific attributes and privileges."
Zebulon G., Chief Executive Officer at Zigabyte, says, "I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
#4 BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management was ranked as the #4 Privileged Access Management (PAM) Tool of 2022. PeerSpot users give BeyondTrust Endpoint Privilege Management an average rating of 8 out of 10.
A Sr. Manager Cyber Security at a manufacturing company says, "The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us. It is a simple and flexible solution for controlling the access and improving the security posture.”
A PAM Architect at a tech services company explains, "What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
#5 IBM Security Secret Server
IBM Security Secret Server was ranked as the #5 Privileged Access Management (PAM) Tool of 2022. PeerSpot users give IBM Security Secret Server an average rating of 10 out of 10.
PeerSpot reviewer, Mohamed A., Senior Presales Specialist at a computer software company, says, "The live recording is a very useful feature.” He also mentions that the solution is “Lightweight, helpful and comprehensive knowledge base, provides live session recording capabilities.”