Top 8 Privileged Access Management (PAM)
CyberArk Privileged Access ManagerBeyondTrust Privileged Remote AccessDelinea Secret ServerBeyondTrust Password SafeBeyondTrust Remote SupportCyberArk Endpoint Privilege ManagerBeyondTrust Endpoint Privilege ManagementOne Identity Safeguard
Popular Comparisons The most valuable feature of CyberArk Privileged Access Manager is privileged threat analytics.
It's secure and reliable. I especially appreciate that it's locked down and only allows access to authorized components.
Popular Comparisons It's a stable product. Based on the demos and interaction with it, it was stable.
I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers.
Popular Comparisons Its technical support is good.
One of the features I find most valuable is workflow, which allows you to configure the solution to have multiple approvals.
Popular Comparisons It simplifies your compliance and tracking to benchmark other credentials and analytics.
The performance is good.
Popular Comparisons The support team who are interfacing with us, are excellent. They are on time for any response.
We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.
Popular Comparisons The solution's technical support is good.
I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good.
Popular Comparisons One of the valuable features is the absence of any local user in a unique system. All users are defined in the AD; communication is only between Unix and AD.
Popular Comparisons All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier.
Buyer's Guide
Privileged Access Management (PAM)
May 2023

Find out what your peers are saying about CyberArk, BeyondTrust, Delinea and others in Privileged Access Management (PAM). Updated: May 2023.
710,326 professionals have used our research since 2012.
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
710,326 professionals have used our research since 2012.
See all 42 solutions in Privileged Access Management (PAM)
Advice From The Community
Read answers to top Privileged Access Management (PAM) questions. 710,326 professionals have gotten help from our community of experts.Privileged Access Management (PAM) Articles
Privileged Access Management (PAM) Topics
What is the purpose of privileged access management?What are PAM tools?What is the difference between IAM and PAM?
What is the purpose of privileged access management?
Privileged access management’s main focus is security. PAM ensures that every user interface has been properly investigated and only the appropriate users have the necessary access to sensitive, critical data environments based on their role or job function. PAM also gives security departments the ability to closely monitor all activities and identify problematic behaviors and inappropriate activities and respond to them immediately. As organizations grow, the need for varying levels of privileged access grows as well, as there are increased endpoints, devices, applications, and cloud usage that have increased the threat surface exponentially. A strong privileged access management solution will have protocols in place to detect problematic, suspicious activities immediately and stop them.
What are PAM tools?
Privileged access management tools are software solutions that designate and assign specific protocols to establish effective privileged access management throughout the enterprise. A PAM tool will define security and privileged access, thereby better facilitating a secure ecosystem throughout the enterprise. PAM tools will monitor all access throughout an enterprise and identify any suspicious activity. Additionally, PAM tools will ensure all compliance regulations are being satisfied by closely monitoring all accounts, access, and privileges.
What is the difference between IAM and PAM?
Identity access management (IAM) and privileged access management (PAM) have different, specific, defined roles, however, they do work synergistically together to keep an enterprise system safe from potential cyber attacks by minimizing the overall threat surface.
Identity access management (IAM) is a set of defined protocols used by IT and security teams to manage everyday general users throughout an enterprise. IT security teams have complete transparency and can monitor all access points, including machines, devices, applications, and all users, internally and remotely. IAM can also have a function in maintaining and protecting password management by implementing multi-step sign-in, password strength, and other types of password management (e.g. change passwords regularly, do not allow repetition of previous passwords, etc.)
PAM utilizes the information from IAM and then distributes the level of privilege based on assigned job duties, roles, and responsibilities. PAM will start with a minimum privilege assignment and, as roles and responsibilities change, redefine privilege protocols as needed.
It is important for organizations to use both IAM and PAM solutions working synchronically together to ensure threat surfaces are kept to a minimum. A synchronized, integrated solution will save an organization time and money and make managing all user access throughout the enterprise easier.
Buyer's Guide
Privileged Access Management (PAM)
May 2023

Find out what your peers are saying about CyberArk, BeyondTrust, Delinea and others in Privileged Access Management (PAM). Updated: May 2023.
710,326 professionals have used our research since 2012.