Hitachi ID Privileged Access Manager [EOL] vs Symantec Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Hitachi ID Privileged Access Manager [EOL] and Symantec Privileged Access Manager based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,886 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."

More Hitachi ID Privileged Access Manager [EOL] Pros →

"Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated.""Whoever built it from the ground up, they understand how an organization is laid out.""It's easy to use and easy to configure.""The DB clustering is a really good benefit of using CA PAM.""It is great for identity governance.""The two factor authentication, and the single most important capability was it supported PIV and CAC as one of the two factors. That was pretty huge for us.""We found that the architecture is scalable and very resilient.""We have received good support from the tech support team."

More Symantec Privileged Access Manager Pros →

Cons
"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."

More Hitachi ID Privileged Access Manager [EOL] Cons →

"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way.""The response time for support could be faster. Some features should be added: cloud-based, VPN-less, more secure, and it should be adjusted in a hybrid environment.""They should include some assignments in the test environment to explore the product's features.""The management console could be improved.""I wish it could create local accounts on desktops.""We have to do a lot of manual work to automate features.""The setup is complex.""They need to do a little bit more on the mainframe side.​"

More Symantec Privileged Access Manager Cons →

Pricing and Cost Advice
  • "Don’t go with an agent model. Don’t go with a model that has you buying a thousand different parts. Go with PAM that gives you everything, or you’ll just be paying costs of implementing another tool that PAM would have just given you up front."
  • "The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
  • "Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
  • "Cost-wise, CA was better compared to others in the market. ​"
  • "Pricing is fair compared to other top vendors."
  • "The licensing is simple and scalable."
  • "I would prefer better licensing options for the 20-100 users we have at a given time."
  • "It is more expensive than other solutions on the market."
  • More Symantec Privileged Access Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:We can check the activities in the server for fragile files and documents in case of any issues.
    Top Answer:The product's pricing depends on the agreement. They offer per-device, per-user, or monthly and yearly licensing models.
    Top Answer:There should be some training platform similar to Microsoft and IBM. We can't find useful documentation or YouTube videos to learn about the process. They should include some assignments in the test… more »
    Ranking
    Unranked
    In Privileged Access Management (PAM)
    Views
    860
    Comparisons
    546
    Reviews
    3
    Average Words per Review
    424
    Rating
    6.7
    Comparisons
    Also Known As
    CA PAM, Xceedium Xsuite, CA Privileged Access Manager
    Learn More
    Overview

    Hitachi ID Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability.

    Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

    Privileged Access Manager grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premise or in the cloud.

    CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

    Sample Customers
    Information Not Available
    NEOVERA, Telesis, eSoft
    Top Industries
    No Data Available
    REVIEWERS
    Retailer20%
    Financial Services Firm20%
    Logistics Company15%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Manufacturing Company14%
    Financial Services Firm13%
    Comms Service Provider10%
    Company Size
    No Data Available
    REVIEWERS
    Small Business28%
    Midsize Enterprise9%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise7%
    Large Enterprise79%
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    768,886 professionals have used our research since 2012.

    Hitachi ID Privileged Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. Hitachi ID Privileged Access Manager [EOL] is rated 7.0, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of Hitachi ID Privileged Access Manager [EOL] writes "Responsive support, requires little maintenance, but configuration could be easier". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". Hitachi ID Privileged Access Manager [EOL] is most compared with , whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management and Delinea Secret Server.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.