Top 8 Privileged Access Management (PAM)

CyberArk Privileged Access ManagerBeyondTrust Privileged Remote AccessDelinea Secret ServerBeyondTrust Password SafeBeyondTrust Remote SupportCyberArk Endpoint Privilege ManagerBeyondTrust Endpoint Privilege ManagementOne Identity Safeguard
  1. leader badge
    The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics. It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.
  2. It's a stable product. Based on the demos and interaction with it, it was stable.I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers.
  3. Buyer's Guide
    Privileged Access Management (PAM)
    May 2023
    Find out what your peers are saying about CyberArk, BeyondTrust, Delinea and others in Privileged Access Management (PAM). Updated: May 2023.
    710,326 professionals have used our research since 2012.
  4. Its technical support is good. One of the features I find most valuable is workflow, which allows you to configure the solution to have multiple approvals.
  5. It simplifies your compliance and tracking to benchmark other credentials and analytics.The performance is good.
  6. The support team who are interfacing with us, are excellent. They are on time for any response.We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.
  7. The solution's technical support is good.I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
  8. report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    710,326 professionals have used our research since 2012.
  9. One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD.
  10. All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier.

Advice From The Community

Read answers to top Privileged Access Management (PAM) questions. 710,326 professionals have gotten help from our community of experts.
it_user151011 - PeerSpot reviewer
Sr. Director of Growth at PeerSpot (formerly IT Central Station)
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass. Hacked accounts included Barack Obama, Joe Biden, Bill Gates,...
Read More »
Ken Shaurette - PeerSpot reviewer
Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
6 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
2 Answers
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees

Hi, 

Which is the best Privileged Account Management solution for an enterprise? Why?

How is the privileged account management solution deployed? Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?

Thank you!

NajibulIslam - PeerSpot reviewer
NajibulIslamHi Mr. @Shibu Babuchandran, Previously Mr. Belenky answered it here What is… more »
6 Answers
Paresh Makwana - PeerSpot reviewer
Paresh Makwana
Director at a tech services company with 1-10 employees

I am a director of a small tech services company.

How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

Idan Shoham - PeerSpot reviewer
Idan ShohamFirst, terminology - there really is no such thing as privileged identity… more »
3 Answers
Simone Antonaci - PeerSpot reviewer
Simone Antonaci
User at 2Five1

Kindly advise on the top 5 solutions within the industry to look at. 

Kishan Kendre - PeerSpot reviewer
Kishan KendreHi Simone, Following are the products which you can look for your requirement.… more »
4 Answers
Oluwatosin Soyoye - PeerSpot reviewer
Oluwatosin Soyoye
User at Union Bank PLC

My Bank is currently looking at PAM Solutions.

Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.

Oleg Shaburov - PeerSpot reviewer
Oleg ShaburovI'd say that everything depends on your detailed requirements. I can tell that I… more »
5 Answers

Privileged Access Management (PAM) Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager at PeerSpot (formerly IT Central Station)
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to the...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, fire...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »

Privileged Access Management (PAM) Topics

What is the purpose of privileged access management?

Privileged access management’s main focus is security. PAM ensures that every user interface has been properly investigated and only the appropriate users have the necessary access to sensitive, critical data environments based on their role or job function. PAM also gives security departments the ability to closely monitor all activities and identify problematic behaviors and inappropriate activities and respond to them immediately. As organizations grow, the need for varying levels of privileged access grows as well, as there are increased endpoints, devices, applications, and cloud usage that have increased the threat surface exponentially. A strong privileged access management solution will have protocols in place to detect problematic, suspicious activities immediately and stop them.

What are PAM tools?

Privileged access management tools are software solutions that designate and assign specific protocols to establish effective privileged access management throughout the enterprise. A PAM tool will define security and privileged access, thereby better facilitating a secure ecosystem throughout the enterprise. PAM tools will monitor all access throughout an enterprise and identify any suspicious activity. Additionally, PAM tools will ensure all compliance regulations are being satisfied by closely monitoring all accounts, access, and privileges.

What is the difference between IAM and PAM?

Identity access management (IAM) and privileged access management (PAM) have different, specific, defined roles, however, they do work synergistically together to keep an enterprise system safe from potential cyber attacks by minimizing the overall threat surface.

Identity access management (IAM) is a set of defined protocols used by IT and security teams to manage everyday general users throughout an enterprise. IT security teams have complete transparency and can monitor all access points, including machines, devices, applications, and all users, internally and remotely. IAM can also have a function in maintaining and protecting password management by implementing multi-step sign-in, password strength, and other types of password management (e.g. change passwords regularly, do not allow repetition of previous passwords, etc.)

PAM utilizes the information from IAM and then distributes the level of privilege based on assigned job duties, roles, and responsibilities. PAM will start with a minimum privilege assignment and, as roles and responsibilities change, redefine privilege protocols as needed.

It is important for organizations to use both IAM and PAM solutions working synchronically together to ensure threat surfaces are kept to a minimum. A synchronized, integrated solution will save an organization time and money and make managing all user access throughout the enterprise easier.

Buyer's Guide
Privileged Access Management (PAM)
May 2023
Find out what your peers are saying about CyberArk, BeyondTrust, Delinea and others in Privileged Access Management (PAM). Updated: May 2023.
710,326 professionals have used our research since 2012.