IT Central Station is now PeerSpot: Here's why

Devolutions Password Server vs Hitachi ID Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
621,548 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention.
Top Answer:The price of the solution is reasonable.
Top Answer:Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions… more »
Ranking
Views
47
Comparisons
33
Reviews
0
Average Words per Review
0
Rating
N/A
Views
167
Comparisons
124
Reviews
1
Average Words per Review
269
Rating
7.0
Comparisons
Learn More
Overview

Managing and controlling access to privileged accounts is of the utmost importance for every organization, regardless of its size. As the concern for insider threats and data breaches is growing, the demand for solutions is also reaching an all-time high. Unfortunately, the majority of existing privileged access management solutions have focused primarily on meeting the needs of large scale organizations. This results in solutions less suited for the specific needs of SMBs, as they tend to be overly complex, challenging to deploy, and beyond budget. This dilemma is what drove Devolutions to create a set of solutions specifically designed to meet the growing needs of small and medium-sized businesses. We call it "PAM for the rest of us."

Hitachi ID Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability.

Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

Privileged Access Manager grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premise or in the cloud.

Offer
Learn more about Devolutions Password Server
Learn more about Hitachi ID Privileged Access Manager
Sample Customers
Schema Networks
Information Not Available
Top Industries
No Data Available
VISITORS READING REVIEWS
Computer Software Company31%
Financial Services Firm20%
Comms Service Provider11%
Government7%
Company Size
No Data Available
VISITORS READING REVIEWS
Small Business23%
Midsize Enterprise12%
Large Enterprise65%
Buyer's Guide
Privileged Access Management (PAM)
July 2022
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: July 2022.
621,548 professionals have used our research since 2012.

Devolutions Password Server is ranked 34th in Privileged Access Management (PAM) while Hitachi ID Privileged Access Manager is ranked 16th in Privileged Access Management (PAM) with 1 review. Devolutions Password Server is rated 0.0, while Hitachi ID Privileged Access Manager is rated 7.0. On the other hand, the top reviewer of Hitachi ID Privileged Access Manager writes "Responsive support, requires little maintenance, but configuration could be easier". Devolutions Password Server is most compared with , whereas Hitachi ID Privileged Access Manager is most compared with CyberArk Privileged Access Manager.

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.