"100% compliant and you don't have to maintain ID management for each and every user."
"The initial setup is very straightforward. It's not complex at all."
"Comprehensive coverage of the required features for the PAM solution."
"Hazard flow could be improved, the data compliance portion."
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think."
"The management console could be improved."
Earn 20 points
ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.
The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.
Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.
ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.
While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
ARCON Privileged Access Management is ranked 5th in Privileged Access Management (PAM) with 2 reviews while Symantec Privileged Access Manager is ranked 10th in Privileged Access Management (PAM) with 1 review. ARCON Privileged Access Management is rated 9.0, while Symantec Privileged Access Manager is rated 0.0. The top reviewer of ARCON Privileged Access Management writes "Good security with an easy initial setup and good stability". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Great features that provide comprehensive coverage of what's required for the PAM solution". ARCON Privileged Access Management is most compared with CyberArk Privileged Access Manager, BeyondTrust Endpoint Privilege Management, Thycotic Secret Server, Cisco ISE (Identity Services Engine) and WALLIX Bastion, whereas Symantec Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, BeyondTrust Endpoint Privilege Management, ForgeRock and BeyondTrust Privileged Remote Access.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.