IT Central Station is now PeerSpot: Here's why

ManageEngine PAM360 vs Thor AdminPrivilege comparison

Cancel
You must select at least 2 products to compare!
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
611,060 professionals have used our research since 2012.
Questions from the Community
Top Answer:One area of improvement for the product would be in the integration with Linux devices. An additional feature I'd like to see in the next release would be session logging.
Top Answer:Use cases can include whatever comes under the purview of access management, such as connecting to services with privileged identity management, privileged access management, and connecting to… more »
Top Answer:My advice would be, if you want a cost effective solution and very competitive pricing, you should go with this product. I would rate the solution a seven out of ten.
Ask a question

Earn 20 points

Ranking
Views
843
Comparisons
684
Reviews
1
Average Words per Review
237
Rating
7.0
Views
73
Comparisons
45
Reviews
0
Average Words per Review
0
Rating
N/A
Comparisons
Also Known As
PAM360
Learn More
Overview

Comprehensive privileged access management solution
Privilege misuse is a top cybersecurity threat today that often results in expensive losses and can even cripple businesses. It's also one of the most popular attack vectors among hackers, because when successfully carried out, it provides free access to an enterprise's underbelly, often without raising any alarms until the damage is done.

ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, you can build a central console where different parts of your IT management system interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies.

Thor AdminPrivilege is the enterprise security tool which makes the life of system administrators easier and provides more protection for each endpoint.

Offer
Learn more about ManageEngine PAM360
Learn more about Thor AdminPrivilege
Sample Customers
Information Not Available
Brother, Symbion, CPH West
Top Industries
VISITORS READING REVIEWS
Comms Service Provider35%
Computer Software Company21%
Financial Services Firm6%
Energy/Utilities Company6%
No Data Available
Company Size
VISITORS READING REVIEWS
Small Business25%
Midsize Enterprise20%
Large Enterprise55%
No Data Available
Buyer's Guide
Privileged Access Management (PAM)
June 2022
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2022.
611,060 professionals have used our research since 2012.

ManageEngine PAM360 is ranked 11th in Privileged Access Management (PAM) with 1 review while Thor AdminPrivilege is ranked 27th in Privileged Access Management (PAM). ManageEngine PAM360 is rated 7.0, while Thor AdminPrivilege is rated 0.0. The top reviewer of ManageEngine PAM360 writes "Value-add is key management; needs better integration with Linux devices". On the other hand, ManageEngine PAM360 is most compared with CyberArk Privileged Access Manager, Delinea Secret Server, WALLIX Bastion, One Identity Safeguard and One Identity Privileged Access Suite for Unix, whereas Thor AdminPrivilege is most compared with .

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.