Symantec Privileged Access Manager and BeyondTrust DevOps Secrets Safe compete in the field of privileged access management. BeyondTrust is favored for its comprehensive features and seamless integration, despite higher costs, while Symantec is recognized for its robust security.
Features: Symantec Privileged Access Manager offers advanced session monitoring, granular access controls, and is known for its strong security posture. BeyondTrust DevOps Secrets Safe provides deep automation capabilities, extensive environment support, and superior integration features beneficial for DevOps.
Room for Improvement: Symantec users seek better scalability, enhanced third-party integrations, and simpler deployment processes. BeyondTrust users suggest improved UI customization, more detailed documentation, and some users note a steeper learning curve for new users.
Ease of Deployment and Customer Service: Symantec's deployment is complex but benefits from responsive support. BeyondTrust is praised for straightforward installation and comprehensive support resources, offering an easier deployment experience for most users.
Pricing and ROI: Symantec presents competitive pricing, though initial setup costs can be high. BeyondTrust, while more expensive, provides a strong return on investment through enhanced productivity and security benefits.
DevOps Secrets Safe is a highly scalable solution that adapts to the speed and agility required in dynamic DevOps workflows. It will help organizations limit the risk associated with substantial unmanaged privileged credentials and secrets without causing friction in highly dynamic environments such as DevOps.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.