IT Central Station is now PeerSpot: Here's why

Top 8 Privileged Access Management (PAM)

CyberArk Privileged Access ManagerDelinea Secret ServerBeyondTrust Privileged Remote AccessOne Identity SafeguardBeyondTrust Remote SupportBeyondTrust Endpoint Privilege ManagementDelinea Privileged Access ServiceCyberArk Endpoint Privilege Manager
  1. leader badge
    It supports lots of requirements in the privileged access management area. It is a robust product.
  2. Number one is the password vault; it's very good. Number two, they have a feature for remote desktops that are created on a per session basis, which is very good for security.
  3. Buyer's Guide
    Privileged Access Management (PAM)
    July 2022
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: July 2022.
    622,358 professionals have used our research since 2012.
  4. One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful.
  5. Safeguard has the ability to record and retrieve in the full-video format. We deployed it into our company for controlling a client's behavior in our data center. It is very useful to control their connections, such as RDP.
  6. It is effective. It is a good way of making sure that you're auditing what's going on. It also makes the end-user feel safe that you're not getting into things that you shouldn't be getting into because they're authorizing different areas for you to see. It is a pretty secure tool. It is important as far as security is concerned. It is very effective in terms of the support personnel being able to get the job done when they need to. It is easy for the end-user or the person we're helping out to understand how to allow somebody in to get the work done.
  7. It's relatively straightforward to set up, especially if you are deploying to the cloud.The privileged access and the application control are helpful in making sure we have good, robust challenge responses. Blacklisting with trusted application protection is also beneficial for us.
  8. report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    622,358 professionals have used our research since 2012.
  9. The most valuable feature is the author's discovery of assets.The reporting is excellent.
  10. The most valuable feature of CyberArk Endpoint Privilege Manager is its ability to reset passwords every time that it is needed or periodically.The most valuable feature is that their database is completely encrypted and protected with multiple layers.

Advice From The Community

Read answers to top Privileged Access Management (PAM) questions. 622,358 professionals have gotten help from our community of experts.
Menachem D Pritzker - PeerSpot reviewer
Menachem D Pritzker
Director of Growth
PeerSpot (formerly IT Central Station)
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass. Hacked accounts included Barack Obama, Joe Biden, Bill Gates,...
Read More »
Ken Shaurette - PeerSpot reviewer
Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
6 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
2 Answers
Paresh Makwana - PeerSpot reviewer
Paresh Makwana
Director at a tech services company with 1-10 employees

I am a director of a small tech services company.

How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

Idan Shoham - PeerSpot reviewer
Idan ShohamFirst, terminology - there really is no such thing as privileged identity… more »
3 Answers
Simone Antonaci - PeerSpot reviewer
Simone Antonaci
User at 2Five1

Kindly advise on the top 5 solutions within the industry to look at. 

Kishan Kendre - PeerSpot reviewer
Kishan KendreHi Simone, Following are the products which you can look for your requirement.… more »
4 Answers
Oluwatosin Soyoye - PeerSpot reviewer
Oluwatosin Soyoye
User at Union Bank PLC

My Bank is currently looking at PAM Solutions.

Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.

Oleg Shaburov - PeerSpot reviewer
Oleg ShaburovI'd say that everything depends on your detailed requirements. I can tell that I… more »
5 Answers

Privileged Access Management (PAM) Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Apr 18 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to the...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, fire...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »

Privileged Access Management (PAM) Topics

What is the purpose of privileged access management?

Privileged access management’s main focus is security. PAM ensures that every user interface has been properly investigated and only the appropriate users have the necessary access to sensitive, critical data environments based on their role or job function. PAM also gives security departments the ability to closely monitor all activities and identify problematic behaviors and inappropriate activities and respond to them immediately. As organizations grow, the need for varying levels of privileged access grows as well, as there are increased endpoints, devices, applications, and cloud usage that have increased the threat surface exponentially. A strong privileged access management solution will have protocols in place to detect problematic, suspicious activities immediately and stop them.

What are PAM tools?

Privileged access management tools are software solutions that designate and assign specific protocols to establish effective privileged access management throughout the enterprise. A PAM tool will define security and privileged access, thereby better facilitating a secure ecosystem throughout the enterprise. PAM tools will monitor all access throughout an enterprise and identify any suspicious activity. Additionally, PAM tools will ensure all compliance regulations are being satisfied by closely monitoring all accounts, access, and privileges.

What is the difference between IAM and PAM?

Identity access management (IAM) and privileged access management (PAM) have different, specific, defined roles, however, they do work synergistically together to keep an enterprise system safe from potential cyber attacks by minimizing the overall threat surface.

Identity access management (IAM) is a set of defined protocols used by IT and security teams to manage everyday general users throughout an enterprise. IT security teams have complete transparency and can monitor all access points, including machines, devices, applications, and all users, internally and remotely. IAM can also have a function in maintaining and protecting password management by implementing multi-step sign-in, password strength, and other types of password management (e.g. change passwords regularly, do not allow repetition of previous passwords, etc.)

PAM utilizes the information from IAM and then distributes the level of privilege based on assigned job duties, roles, and responsibilities. PAM will start with a minimum privilege assignment and, as roles and responsibilities change, redefine privilege protocols as needed.

It is important for organizations to use both IAM and PAM solutions working synchronically together to ensure threat surfaces are kept to a minimum. A synchronized, integrated solution will save an organization time and money and make managing all user access throughout the enterprise easier.

Buyer's Guide
Privileged Access Management (PAM)
July 2022
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: July 2022.
622,358 professionals have used our research since 2012.