Coming October 25: PeerSpot Awards will be announced! Learn more
2020-01-22T12:44:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 0

What advice do you have for others considering Fudo PAM?

If you were talking to someone whose organization is considering Fudo PAM, what would you say?

How would you rate it and why? Any other tips or advice?

3
PeerSpot user
3 Answers
Mahdi Talaee - PeerSpot reviewer
Information Technology Security Specialist at BornaNetworkManagers
Reseller
2020-09-16T08:18:38Z
16 September 20

Right now we are encouraging our customers to use Fudo PAM because it is the only product in PAM technology that we have to offer them. Because we have looked into it, we are convinced that Fudo PAM is better than WALLIX. Living in Iran and providing security products is really the core of a business such as ours. On a scale from one to ten (where one is the worst and ten is the best), I would rate Fudo PAM as an eight-out-of-ten. It gets and eight because, from my research, I think there are some ways that WALLIX is better than the Fudo. So in that way, Fudo has places where it can improve. We are judging that by our technical research, so I am not sure about it first hand as we have not actually used WALLIX.

IS
IT Specialist at IT Specialist LLC
Real User
2020-03-03T08:47:00Z
03 March 20

I would rate Fudo Privileged Access Management at a nine out of ten.

OZ
Lead Systems Architect at IT Specialist LLC
Real User
2020-01-22T12:44:00Z
22 January 20

We are in the process of migrating from version 4.0 to version 4.2. This is a solution that I recommend because it is a simple privileged access management system that is done very well. They're a company that directs all of their efforts to this specific goal and they do it great. I would rate this solution an eight out of ten.

Find out what your peers are saying about Fudo Security, CyberArk, WALLIX and others in Privileged Access Management (PAM). Updated: September 2022.
635,987 professionals have used our research since 2012.
Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Sep 16, 2020
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 3 answers
OZ
Lead Systems Architect at IT Specialist LLC
22 January 20
We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally. Fudo PAM is used for access management.
IS
IT Specialist at IT Specialist LLC
03 March 20
We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
Sep 16, 2020
Please share with the community what you think needs improvement with Fudo PAM. What are its weaknesses? What would you like to see changed in a future version?
See 2 answers
OZ
Lead Systems Architect at IT Specialist LLC
22 January 20
Professional training and certification would be great. Regional support in Ukraine is lacking, although they are new and do not have many offices around the world. It would be helpful to have the ability to search for privileged accounts on endpoints, such as service accounts.
Mahdi Talaee - PeerSpot reviewer
Information Technology Security Specialist at BornaNetworkManagers
16 September 20
From what we know and have seen, I do not think that Fudo PAM has to add much of anything to meet user needs. The ease-of-use for setting up session management and password management could be enhanced because they are really important for our customers and other users. The easier it is for them, the better. The initial setup and installation was a little buggy and took longer than expected. This part of the solution should be improved.
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, firewalls, IDS, IPS, SIEMs and email gateways are no longer considered fully effective. It needs to be c...
See 2 comments
DM
Director at DNAX s.r.o.
12 January 22
As a cybersecurity professional, I would NEVER outsource a PAM solution anywhere outside of my company, no matter how beneficiary it could look at a first sight. In the end, it can cost you everything.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
17 January 22
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 11, 2021
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user. Lik...
Related Solutions
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 18, 2022
Top 5 Privileged Access Management (PAM) Tools 2022
Top 5 Privileged Access Management (PAM) Tools PeerSpot’s crowdsourced user review platform help...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Jan 17, 2022
Privileged Access Management as a Service (PAMaaS): benefits and service offerings
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing tec...
Download Free Report
Download our free Privileged Access Management (PAM) Report and find out what your peers are saying about Fudo Security, CyberArk, WALLIX, and more! Updated: September 2022.
DOWNLOAD NOW
635,987 professionals have used our research since 2012.