Top 8 Privileged Access Management (PAM)

CyberArk Privileged Access ManagerDelinea Secret ServerBeyondTrust Privileged Remote AccessBeyondTrust Remote SupportOne Identity SafeguardBeyondTrust Password SafeBeyondTrust Endpoint Privilege ManagementCyberArk Endpoint Privilege Manager
  1. leader badge
    Performance-wise, it is excellent. We found the initial setup to be easy.
  2. The solution is good.The solution is scalable.
  3. Buyer's Guide
    Privileged Access Management (PAM)
    November 2022
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: November 2022.
    653,522 professionals have used our research since 2012.
  4. PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do.
  5. We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.Remote sessions are automatically recorded so there is a history of all coding and scripting.
  6. All the features are promising, but we love the reporting feature because we can get each and every report. That's a major compliance requirement. Its reporting is really amazing, and it has made life a lot easier.
  7. The ability to manage privileged account passwords is the most valuable feature.Screen recording is valuable, and integration with applications is easy. We can customize whatever we want. We did a lot of application integration using scripting.
  8. report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    653,522 professionals have used our research since 2012.
  9. It has some features that other products don't have yet, differentiation that sets it apart in the marketplace... Those features are a centralized dashboard and the ability to issue and revoke entitlements within minutes. That makes a difference.
  10. The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management.

Advice From The Community

Read answers to top Privileged Access Management (PAM) questions. 653,522 professionals have gotten help from our community of experts.
Menachem D Pritzker - PeerSpot reviewer
Menachem D Pritzker
Director of Growth
PeerSpot (formerly IT Central Station)
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass. Hacked accounts included Barack Obama, Joe Biden, Bill Gates,...
Read More »
Ken Shaurette - PeerSpot reviewer
Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
6 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
2 Answers
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services

Hi, 

Which is the best Privileged Account Management solution for an enterprise? Why?

How is the privileged account management solution deployed? Can it work on-premises or in the cloud in physical or virtual environments, hosted on Windows or Linux OS?

Thank you!

NajibulIslam - PeerSpot reviewer
NajibulIslamHi Mr. @Shibu Babuchandran, Previously Mr. Belenky answered it here What is… more »
6 Answers
Paresh Makwana - PeerSpot reviewer
Paresh Makwana
Director at a tech services company with 1-10 employees

I am a director of a small tech services company.

How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?

Idan Shoham - PeerSpot reviewer
Idan ShohamFirst, terminology - there really is no such thing as privileged identity… more »
3 Answers
Simone Antonaci - PeerSpot reviewer
Simone Antonaci
User at 2Five1

Kindly advise on the top 5 solutions within the industry to look at. 

Kishan Kendre - PeerSpot reviewer
Kishan KendreHi Simone, Following are the products which you can look for your requirement.… more »
4 Answers
Oluwatosin Soyoye - PeerSpot reviewer
Oluwatosin Soyoye
User at Union Bank PLC

My Bank is currently looking at PAM Solutions.

Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.

Oleg Shaburov - PeerSpot reviewer
Oleg ShaburovI'd say that everything depends on your detailed requirements. I can tell that I… more »
5 Answers

Privileged Access Management (PAM) Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to the...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, fire...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »

Privileged Access Management (PAM) Topics

What is the purpose of privileged access management?

Privileged access management’s main focus is security. PAM ensures that every user interface has been properly investigated and only the appropriate users have the necessary access to sensitive, critical data environments based on their role or job function. PAM also gives security departments the ability to closely monitor all activities and identify problematic behaviors and inappropriate activities and respond to them immediately. As organizations grow, the need for varying levels of privileged access grows as well, as there are increased endpoints, devices, applications, and cloud usage that have increased the threat surface exponentially. A strong privileged access management solution will have protocols in place to detect problematic, suspicious activities immediately and stop them.

What are PAM tools?

Privileged access management tools are software solutions that designate and assign specific protocols to establish effective privileged access management throughout the enterprise. A PAM tool will define security and privileged access, thereby better facilitating a secure ecosystem throughout the enterprise. PAM tools will monitor all access throughout an enterprise and identify any suspicious activity. Additionally, PAM tools will ensure all compliance regulations are being satisfied by closely monitoring all accounts, access, and privileges.

What is the difference between IAM and PAM?

Identity access management (IAM) and privileged access management (PAM) have different, specific, defined roles, however, they do work synergistically together to keep an enterprise system safe from potential cyber attacks by minimizing the overall threat surface.

Identity access management (IAM) is a set of defined protocols used by IT and security teams to manage everyday general users throughout an enterprise. IT security teams have complete transparency and can monitor all access points, including machines, devices, applications, and all users, internally and remotely. IAM can also have a function in maintaining and protecting password management by implementing multi-step sign-in, password strength, and other types of password management (e.g. change passwords regularly, do not allow repetition of previous passwords, etc.)

PAM utilizes the information from IAM and then distributes the level of privilege based on assigned job duties, roles, and responsibilities. PAM will start with a minimum privilege assignment and, as roles and responsibilities change, redefine privilege protocols as needed.

It is important for organizations to use both IAM and PAM solutions working synchronically together to ensure threat surfaces are kept to a minimum. A synchronized, integrated solution will save an organization time and money and make managing all user access throughout the enterprise easier.

Buyer's Guide
Privileged Access Management (PAM)
November 2022
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: November 2022.
653,522 professionals have used our research since 2012.