Best Privileged Access Management (PAM) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

  • Allow administrators to create and provision privileged access accounts
  • Offer a secure vault to store privileged credentials or provision users with just-in-time access
  • Monitor, record, and log user actions while using privileged accounts

Best Privileged Access Management (PAM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
151 Listings in Privileged Access Management (PAM) Available
(22)4.7 out of 5
3rd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    6
    Ease of Use
    6
    Features
    5
    Implementation Ease
    5
    Real-time Monitoring
    5
    Cons
    Limited Features
    3
    Insufficient Detail
    2
    Limited Customization
    2
    Slow Performance
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    9.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Needham, MA
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 36% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
6
Ease of Use
6
Features
5
Implementation Ease
5
Real-time Monitoring
5
Cons
Limited Features
3
Insufficient Detail
2
Limited Customization
2
Slow Performance
2
Alert Management
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
9.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2013
HQ Location
Needham, MA
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec PAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Cons
    Complex Setup
    1
    Time Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec PAM features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    6.9
    Approval Workflows
    Average: 8.7
    7.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 32% Mid-Market
Symantec PAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Cons
Complex Setup
1
Time Delays
1
Symantec PAM features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
6.9
Approval Workflows
Average: 8.7
7.3
Audit log
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,880 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(54)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lumos Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Automation
    8
    Security
    6
    Customer Support
    5
    Time-saving
    4
    Cons
    Missing Features
    4
    Limited Integrations
    3
    Access Control
    2
    App Functionality Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lumos features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lumos
    Company Website
    Year Founded
    2020
    HQ Location
    Silicon Valley, California
    Twitter
    @lumosidentity
    273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    149 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Mid-Market
  • 20% Enterprise
Lumos Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Automation
8
Security
6
Customer Support
5
Time-saving
4
Cons
Missing Features
4
Limited Integrations
3
Access Control
2
App Functionality Issues
2
Poor Customer Support
2
Lumos features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
Lumos
Company Website
Year Founded
2020
HQ Location
Silicon Valley, California
Twitter
@lumosidentity
273 Twitter followers
LinkedIn® Page
www.linkedin.com
149 employees on LinkedIn®
(21)4.5 out of 5
15th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Password Safe Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    2
    Access Control
    1
    Auditing
    1
    Automation
    1
    Centralized Management
    1
    Cons
    Expensive
    1
    Poor Customer Support
    1
    Poor User Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Password Safe features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.5
    Approval Workflows
    Average: 8.7
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 29% Mid-Market
BeyondTrust Password Safe Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
2
Access Control
1
Auditing
1
Automation
1
Centralized Management
1
Cons
Expensive
1
Poor Customer Support
1
Poor User Interface
1
BeyondTrust Password Safe features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.5
Approval Workflows
Average: 8.7
8.8
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,380 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 92% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Ease of Use
    6
    Connectivity
    4
    Device Management
    3
    Helpful
    3
    Cons
    Admin Limitations
    2
    Connectivity Issues
    2
    Dependency Issues
    2
    Difficult Management
    2
    Difficult Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Reporting
    Average: 8.7
    8.8
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 92% Enterprise
  • 33% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Ease of Use
6
Connectivity
4
Device Management
3
Helpful
3
Cons
Admin Limitations
2
Connectivity Issues
2
Dependency Issues
2
Difficult Management
2
Difficult Setup
2
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.0
Reporting
Average: 8.7
8.8
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,361 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(104)4.5 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teleport Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    33
    Security
    24
    Access Control
    21
    Reliability
    16
    Easy Access
    14
    Cons
    Poor Documentation
    13
    Documentation
    11
    Difficult Setup
    9
    Lack of Information
    7
    Authentication Issues
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teleport features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.2
    Approval Workflows
    Average: 8.7
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teleport
    Company Website
    Year Founded
    2015
    HQ Location
    Oakland, California
    Twitter
    @goteleport
    3,733 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Teleport Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
33
Security
24
Access Control
21
Reliability
16
Easy Access
14
Cons
Poor Documentation
13
Documentation
11
Difficult Setup
9
Lack of Information
7
Authentication Issues
6
Teleport features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.2
Approval Workflows
Average: 8.7
8.9
Audit log
Average: 8.7
Seller Details
Seller
Teleport
Company Website
Year Founded
2015
HQ Location
Oakland, California
Twitter
@goteleport
3,733 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Remote Desktop Manager (RDM) is a comprehensive remote access management solution designed to help IT departments centralize and streamline all remote connections within an organization. By providing

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Remote Desktop Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Remote Access
    8
    User Interface
    7
    Easy Access
    5
    Security
    5
    Cons
    Slow Performance
    8
    Limited OS Compatibility
    3
    Remote Access Issues
    3
    Screen Management
    3
    Improvement Needed
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    9.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,204 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Remote Desktop Manager (RDM) is a comprehensive remote access management solution designed to help IT departments centralize and streamline all remote connections within an organization. By providing

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 40% Mid-Market
Devolutions Remote Desktop Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Remote Access
8
User Interface
7
Easy Access
5
Security
5
Cons
Slow Performance
8
Limited OS Compatibility
3
Remote Access Issues
3
Screen Management
3
Improvement Needed
2
Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
9.3
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,204 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
(13)4.3 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PrivX is a scalable, cost-efficient, and highly automated privileged access management (PAM) solution for hybrid and multi-cloud environments, quantum-safe connections and any combination of password

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSH PrivX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Auditing
    1
    Customer Support
    1
    Deployment Ease
    1
    Ease of Configuration
    1
    Ease of Use
    1
    Cons
    Authentication Issues
    1
    Integration Difficulty
    1
    Lack of Features
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH PrivX features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    7.4
    Reporting
    Average: 8.7
    8.7
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,394 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PrivX is a scalable, cost-efficient, and highly automated privileged access management (PAM) solution for hybrid and multi-cloud environments, quantum-safe connections and any combination of password

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Small-Business
SSH PrivX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Auditing
1
Customer Support
1
Deployment Ease
1
Ease of Configuration
1
Ease of Use
1
Cons
Authentication Issues
1
Integration Difficulty
1
Lack of Features
1
Poor Reporting
1
SSH PrivX features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
7.4
Reporting
Average: 8.7
8.7
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,394 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akeyless Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    8
    Customer Support
    7
    Secure Storage
    4
    Easy Management
    3
    Cons
    Documentation
    2
    Lack of Features
    2
    Poor Documentation
    2
    Authentication Issues
    1
    Navigation Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Reporting
    Average: 8.7
    7.9
    Approval Workflows
    Average: 8.7
    7.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 30% Mid-Market
Akeyless Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
8
Customer Support
7
Secure Storage
4
Easy Management
3
Cons
Documentation
2
Lack of Features
2
Poor Documentation
2
Authentication Issues
1
Navigation Issues
1
Akeyless Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
7.9
Reporting
Average: 8.7
7.9
Approval Workflows
Average: 8.7
7.9
Audit log
Average: 8.7
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
257 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Administration Management
    1
    Data Security
    1
    Ease of Use
    1
    Security
    1
    Simple
    1
    Cons
    Clunky Interface
    1
    Complex Administration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Administration Management
1
Data Security
1
Ease of Use
1
Security
1
Simple
1
Cons
Clunky Interface
1
Complex Administration
1
Complexity
1
Complex Setup
1
Complex Usage
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,527 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
(41)4.4 out of 5
View top Consulting Services for Delinea Secret Server
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Secret Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Integrations
    3
    Cloud Services
    2
    Deployment Ease
    2
    Security
    2
    Cons
    Software Bugs
    2
    Complex Usage
    1
    Documentation
    1
    Expensive
    1
    Implementation Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Secret Server features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    8.2
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    790 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Mid-Market
  • 29% Enterprise
Delinea Secret Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Integrations
3
Cloud Services
2
Deployment Ease
2
Security
2
Cons
Software Bugs
2
Complex Usage
1
Documentation
1
Expensive
1
Implementation Difficulty
1
Delinea Secret Server features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
8.2
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
790 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. With CloudEagle.ai, enterprises like RingCentral, Shiji, Recroom make

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 29% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CloudEagle.ai is a platform that automates the process of license management, providing insights into license usage, managing vendor data, and offering security and compliance services.
    • Users like the platform's ability to identify underutilized licenses, automate onboarding and offboarding processes, provide detailed license insights, and offer a user-friendly dashboard for managing all software in one place.
    • Users experienced some difficulties with the initial setup and understanding of the platform's features, the speed of the mobile app, and the platform's compatibility with certain old technologies.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudEagle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    18
    Ease of Use
    17
    Time-Saving
    15
    Features
    13
    Customer Support
    12
    Cons
    Difficult Learning
    9
    Complex Setup
    7
    Setup Difficulty
    6
    Difficult Setup
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudEagle features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.7
    9.4
    Approval Workflows
    Average: 8.7
    9.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Palo Alto, US
    Twitter
    @cloudeagleai
    121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. With CloudEagle.ai, enterprises like RingCentral, Shiji, Recroom make

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 29% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CloudEagle.ai is a platform that automates the process of license management, providing insights into license usage, managing vendor data, and offering security and compliance services.
  • Users like the platform's ability to identify underutilized licenses, automate onboarding and offboarding processes, provide detailed license insights, and offer a user-friendly dashboard for managing all software in one place.
  • Users experienced some difficulties with the initial setup and understanding of the platform's features, the speed of the mobile app, and the platform's compatibility with certain old technologies.
CloudEagle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
18
Ease of Use
17
Time-Saving
15
Features
13
Customer Support
12
Cons
Difficult Learning
9
Complex Setup
7
Setup Difficulty
6
Difficult Setup
5
Learning Curve
5
CloudEagle features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.7
9.4
Approval Workflows
Average: 8.7
9.3
Audit log
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Palo Alto, US
Twitter
@cloudeagleai
121 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    Market Segment
    • 84% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppler secrets management platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Easy Integrations
    10
    Integrations
    7
    Flexibility
    5
    Device Management
    4
    Cons
    Expensive
    7
    Complex Setup
    3
    Setup Difficulty
    3
    Poor Navigation
    2
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
Market Segment
  • 84% Small-Business
  • 16% Mid-Market
Doppler secrets management platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Easy Integrations
10
Integrations
7
Flexibility
5
Device Management
4
Cons
Expensive
7
Complex Setup
3
Setup Difficulty
3
Poor Navigation
2
Dependency Issues
1
Doppler secrets management platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,379 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Password Manager Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Efficiency
    1
    Implementation Ease
    1
    Cons
    Complex Setup
    1
    Connectivity Issues
    1
    Difficult Setup
    1
    Remote Access Issues
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,666 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
ManageEngine Password Manager Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Efficiency
1
Implementation Ease
1
Cons
Complex Setup
1
Connectivity Issues
1
Difficult Setup
1
Remote Access Issues
1
Setup Difficulty
1
ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,666 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
(12)4.3 out of 5
11th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Entitle Just-in-Time Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Easy Setup
    6
    Automation
    5
    Ease of Implementation
    5
    Ease of Use
    4
    Cons
    Complex Usage
    3
    Complexity
    2
    Complex Queries
    2
    Complex Usability
    2
    Connection Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    9.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entitle
    Company Website
    Year Founded
    2021
    HQ Location
    New York, NY
    Twitter
    @EntitleIO
    90 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
BeyondTrust Entitle Just-in-Time Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Easy Setup
6
Automation
5
Ease of Implementation
5
Ease of Use
4
Cons
Complex Usage
3
Complexity
2
Complex Queries
2
Complex Usability
2
Connection Issues
2
BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
9.6
Audit log
Average: 8.7
Seller Details
Seller
Entitle
Company Website
Year Founded
2021
HQ Location
New York, NY
Twitter
@EntitleIO
90 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®