

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
| Product | Mindshare (%) |
|---|---|
| Symantec Privileged Access Manager | 1.7% |
| Veza | 1.4% |
| Other | 96.9% |


| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 6 |
| Large Enterprise | 30 |
Symantec Privileged Access Manager provides enterprises with advanced capabilities in managing access and security compliance, emphasizing seamless integration and scalability. Organizations leverage it for simplified access control and proactive security management to enhance data privacy.
It's designed for managing privileged access across diverse IT environments, featuring easy deployment and configuration along with robust integration capabilities. Users benefit from its scalable architecture, transparent login procedures, and comprehensive password management. Despite its strengths, some challenges persist with the interface, policy management, and upgrade processes. Session recording limitations and documentation gaps are noted, impacting overall user satisfaction. Integration with specific systems, especially mainframes, and a restrictive pricing model present challenges. Nonetheless, its role in managing admin access and reducing security threats in Linux and Windows environments remains critical. Enhanced security is further achieved through integration with CA strong authentication.
What features does Symantec Privileged Access Manager offer?Organizations in the financial sector appreciate its effective management of privileged accounts across IT infrastructures, including servers and applications. It's valued for its role in RDP and SSH session facilitation and focus on enterprise-level security, crucial for identity governance and protecting high-stakes data.
Veza Core Authorization Platform enhances data access visibility, centralizes control, and simplifies user permissions management. Its robust security through zero-trust principles, seamless integration, and automated compliance reporting boost organizational efficiency, productivity, and security, while streamlining workflows and minimizing vulnerabilities.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.