We changed our name from IT Central Station: Here's why

Fudo PAM OverviewUNIXBusinessApplication

Fudo PAM is #7 ranked solution in top Privileged Access Management (PAM) tools. PeerSpot users give Fudo PAM an average rating of 8 out of 10. Fudo PAM is most commonly compared to CyberArk Privileged Access Manager: Fudo PAM vs CyberArk Privileged Access Manager. The top industry researching this solution are professionals from a comms service provider, accounting for 29% of all views.
What is Fudo PAM?

We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

Fudo PAM was previously known as Fudo Privileged Access Management.

Buyer's Guide

Download the Privileged Access Management (PAM) Buyer's Guide including reviews and more. Updated: January 2022

Fudo PAM Customers

KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL

Fudo PAM Video

Fudo PAM Reviews

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Mahdi Talaee
Information Technology Security Specialist at BornaNetworkManagers
Top 5
Our research shows this is superior to competing products in some ways
Pros and Cons
  • "We are convinced that Fudo PAM is better than competing products like WALLIX."
  • "The stability is not very good."

What is our primary use case?

The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session.  

What is most valuable?

We do not have a lot of detailed information about Fudo PAM from a user's perspective. We mostly have collected studies about the feature set and comparisons to other products. We were looking to answer some questions for customers such as if it were possible in Fudo to block a session if users try to run an application and other questions like that.  

What needs improvement?

From what we know and have seen, I do not think that Fudo PAM has to add much of anything to meet user needs. The ease-of-use for setting up session management and password management could be enhanced because they are really important for our customers and other users. The easier it is for them, the better.   

The initial setup and installation was a little buggy and took longer than expected. This part of the solution should be improved.  

For how long have I used the solution?

We have not really been using Fudo PAM (Privileged Access Management) for a long time. Our experience with it is really just a one-off implementation for a client who needed us to use the solution in our project with them.  

What do I think about the stability of the solution?

To tell you the truth, I find that Fudo is not very stable and we had some issues during the implementation. It is working now, but it was not stable to start with and the implementation process should have been easier.  

What do I think about the scalability of the solution?

From what we know of the product it is scalable. The clients that we serve want to have a scalable solution and this is one of the claims of the vendor.  

Which solution did I use previously and why did I switch?

We are involved in working with some other security products in the antivirus and ESET (Essential Security against Evolving Threats) categories like Kaspersky DLC (Data Link Control) and EDR (Enhanced Data Detection and Response). We just want to be able to offer a variety of solutions to our customers and good information on products such as Fudo PAM. If we just provide Fudo PAM for our customers, the customers will want to know how other products compare and maybe which ones are better than the others. We have to study the range of products to know those answers.  

How was the initial setup?

I think it is really important that the duration of implementation is short. This is especially true when you are doing the installations for a client. It does not matter which products we are talking about — whether it is Fudo or WALLIX — customers will want to have it deployed in a short amount of time. The time it takes for the implementation is really important. Customers want to implement and scale their PAM solution in a short time. This aspect of Fudo could be improved.  

Which other solutions did I evaluate?

One of our customers wanted to know about WALLIX and how it compared to Fudo. They needed to know the differences between them. We just want to get more familiar with these two products and be aware of the features and advantages so we had to study them.  

What other advice do I have?

Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them. Because we have looked into it, we are convinced that Fudo PAM is better than WALLIX. Living in Iran and providing security products is really the core of a business such as ours.  

On a scale from one to ten (where one is the worst and ten is the best), I would rate Fudo PAM as an eight-out-of-ten. It gets and eight because, from my research, I think there are some ways that WALLIX is better than the Fudo. So in that way, Fudo has places where it can improve. We are judging that by our technical research, so I am not sure about it first hand as we have not actually used WALLIX.  

Which deployment model are you using for this solution?

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
IT Specialist at IT Specialist LLC
Real User
Top 20
Enables us to control access and to administer computers and servers in our company
Pros and Cons
  • "it's perfect to control and administer computers in our company."
  • "The configuration is difficult."

What is our primary use case?

We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.

How has it helped my organization?

I cannot say much about this, because I use only the client. I do not configure the servers. A colleague that I work with has expressed some issues with the configuration. The configuration is difficult.

What is most valuable?

I think that Fudo Privileged Access Management is a very good program. For our system, it's perfect to control and administer computers in our company. We can usually find information or find what users are doing on our servers. Both the dashboards and the interface are good. I like this program and I like the front end and feature in Fudo Privileged Access Management.

For how long have I used the solution?

We have been using Fudo Privileged Access Management for one month.

How was the initial setup?

A colleague that I work with has expressed some issues with the configuration. The configuration is difficult.

What other advice do I have?

I would rate Fudo Privileged Access Management at a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: partner