Best Privileged Access Management (PAM) Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

  • Allow administrators to create and provision privileged access accounts
  • Offer a secure vault to store privileged credentials or provision users with just-in-time access
  • Monitor, record, and log user actions while using privileged accounts

Best Privileged Access Management (PAM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
151 Listings in Privileged Access Management (PAM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Newark, Delaware
    LinkedIn® Page
    www.linkedin.com
    109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Newark, Delaware
LinkedIn® Page
www.linkedin.com
109 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    5.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smallstep
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @smallsteplabs
    1,529 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
5.8
Audit log
Average: 8.7
Seller Details
Seller
Smallstep
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@smallsteplabs
1,529 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    0.0
    No information available
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
UserLock features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
0.0
No information available
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 2AB iLock Security Services features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    2AB
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
2AB iLock Security Services features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
2AB
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adaptive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Automation
    1
    Customization Features
    1
    Data Protection
    1
    Ease
    1
    Cons
    Data Privacy
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Automation
1
Customization Features
1
Data Protection
1
Ease
1
Cons
Data Privacy
1
Expensive
1
Adaptive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthNull Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    MFA Security
    1
    Security
    1
    Cons
    Lack of Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthNull features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authnull
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthNull Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
MFA Security
1
Security
1
Cons
Lack of Features
1
AuthNull features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Authnull
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,380 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Core Access Insight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Core Access Insight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,449 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Core Access Insight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Poor Customer Support
1
Core Access Insight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,449 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyberelements features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Systancia
    HQ Location
    Sausheim,
    Twitter
    @Systancia
    751 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
cyberelements features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Systancia
HQ Location
Sausheim,
Twitter
@Systancia
751 Twitter followers
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Formal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Admin Control
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Formal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Formal
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Formal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Admin Control
1
Security
1
Cons
This product has not yet received any negative sentiments.
Formal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Formal
LinkedIn® Page
www.linkedin.com
(1)4.5 out of 5
View top Consulting Services for Krontech Single Connect Privileged Session Manager
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Istanbul, TR
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
2007
HQ Location
Istanbul, TR
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine PAM360 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,666 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ManageEngine PAM360 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,666 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • One Identity Safeguard features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,412 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,665 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
One Identity Safeguard features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,412 Twitter followers
LinkedIn® Page
www.linkedin.com
3,665 employees on LinkedIn®
Ownership
NYSE: DGX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,700 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,700 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • P0 Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Francisco, CA
    Twitter
    @P0Security
    49 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
P0 Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2022
HQ Location
San Francisco, CA
Twitter
@P0Security
49 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®