2020-01-22T12:44:00Z

What is your primary use case for Fudo PAM?

Miriam Tover - PeerSpot reviewer
  • 0
  • 14
PeerSpot user
5

5 Answers

TD
Reseller
Top 5Leaderboard
2023-04-04T12:43:00Z
Apr 4, 2023

The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password management for privileged users. These are two additional main concepts. When we talk about third-party users, it's a usual tool because Fudo PAM is a privileged access management tool. We are referring to different users, such as IT administrators, database administrators, and third-party users. The users who connect to customers' manufacturers to solve outsourcing problems, etc. These are classic cases where we propose Fudo PAM to our customers and use it for our infrastructure.

Search for a product comparison
Oleksiy-Zaionchkovskyy - PeerSpot reviewer
Reseller
Top 10
2022-11-25T12:54:18Z
Nov 25, 2022

I work for an IT integrator company. We're resellers.

SK
Reseller
2020-09-16T08:18:38Z
Sep 16, 2020

The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session.

IS
Real User
2020-03-03T08:47:00Z
Mar 3, 2020

We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.

OZ
Real User
2020-01-22T12:44:00Z
Jan 22, 2020

We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally. Fudo PAM is used for access management.

Find out what your peers are saying about Fudo Security, CyberArk, WALLIX and others in Privileged Access Management (PAM). Updated: March 2024.
767,319 professionals have used our research since 2012.
Privileged Access Management (PAM)
What is Privileged Access Management? Privileged access management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure.
Download Privileged Access Management (PAM) ReportRead more