2022-04-18T09:10:00Z
NC
Content Manager at PeerSpot (formerly IT Central Station)
  • 2068
Published:

Top 5 Privileged Access Management (PAM) Tools 2022

Product comparison that may be of interest to you
0
PeerSpot user
Find out what your peers are saying about CyberArk Privileged Access Manager vs. Delinea Secret Server and other solutions. Updated: September 2023.
735,432 professionals have used our research since 2012.
Related Questions
Basov Mikhail - PeerSpot reviewer
System Engineer at USSC
Aug 17, 2023
Hello community,  I am a System Engineer at a medium-sized financial services firm. Can you please share One Identity Safeguard's lower-level architecture scheme? Thank you for your help.
See 1 answer
Anne Cubarrubia - PeerSpot reviewer
Editor at PeerSpot
Aug 17, 2023
One Identity Safeguard's lower-level architecture scheme is a three-tier architecture made up of the following layers: The Presentation layer presents data and is responsible for user interaction. It includes the web interface, client applications, and APIs. The Application layer is for business logic and data processing. It includes the Safeguard server, database, and other applications. The Infrastructure layer provides the underlying infrastructure for the other layers. It includes the operating system, hardware, and networking components. The three-tier architecture is a common design pattern for enterprise software applications. It provides a separation of concerns between the different layers, which makes the application more scalable, reliable, and secure.
AG
Associate VP & Cyber Security Specialist at Union Bank of California
Aug 14, 2023
Hello community,  I am the Associate VP and Cyber Security Specialist at a large bank. I am researching PAM tools. These are our requirements for the PAM tool needed: - Privileged Access Governance and Administrative - Privileged Accounts Discovery and Management - Privileged Credentials Management - Privileged Session Management - Privileged Access Logging, Reporting, and Audit - Privi...
See 2 answers
Nurlan Temirbulatov - PeerSpot reviewer
Sales Engineer at Remediant
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
IT Manager at CAS Trading House
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
May 12, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top User Behavior Analytics - UEBA Tools...
NC
Content Manager at PeerSpot (formerly IT Central Station)
Jun 3, 2022
Top 8 Enterprise Password Managers Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for th...
See 1 comment
JT
CTO at NATIONAL MOTOR FREIGHT TRAFFIC ASSOCIATION INC
Jun 3, 2022
I am implementing Thycotic Secret Server (now Delinea) for my new company. This will be the second time I have implemented it.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Jan 17, 2022
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, firewalls, IDS, IPS, SIEMs and email gateways are no longer considered fully effective. It needs to be c...
See 2 comments
DM
Director at DNAX s.r.o.
Jan 12, 2022
As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Jan 17, 2022
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
Product Comparisons
Related Articles
NC
Content Manager at PeerSpot (formerly IT Central Station)
May 12, 2022
Top 7 User Behavior Analytics (UEBA) Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
NC
Content Manager at PeerSpot (formerly IT Central Station)
Jun 3, 2022
Top 8 Enterprise Password Managers 2022
Top 8 Enterprise Password Managers Tools PeerSpot’s crowdsourced user review platform helps tech...
Download Free Report
Download our FREE report comparing CyberArk Privileged Access Manager and Delinea Secret Server based on reviews, features, and more! Updated: September 2023.
DOWNLOAD NOW
735,432 professionals have used our research since 2012.