Privileged Access Management (PAM) Users Have Shared Their Experience With Us

Updated January 2026

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE Privileged Access Management (PAM) report based on 790+ real user experiences with these popular products:

...and 68 more!

Where should we email your report?






CyberArk Privileged Access Manager review

Sean Izor
Sean Izor
Senior PAM Consultant at a tech services company with 201-500 employees
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000...
One Identity Safeguard review

Vyas Shubham
Vyas Shubham
Product Analyst at a consultancy with 51-200 employees
Centralized controls have improved privileged access and simplified compliant...
We use One Identity Safeguard as a central control point for all our privileged access, which helps standardize the access policies across teams and platforms. We also use it for the approval workflows, which are enforced for high-risk systems and add an extra security layer for production access. I have been using it for one and a half...

Since 2012, we've had 880,745 professionals use our research.

As seen in