Introducing G2.ai, the future of software buying.Try now

Best Privileged Access Management (PAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts
Show More
Show Less

Best Privileged Access Management (PAM) Software At A Glance

Leader:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Privileged Access Management (PAM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
152 Listings in Privileged Access Management (PAM) Available
(3,731)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a platform that centralizes identity and device management, supports Windows, macOS, and Linux, and integrates with Google Workspace and Microsoft 365.
    • Users frequently mention the ease of managing users and devices from a single platform, the streamlined integration with other applications, and the time-saving automation of tedious tasks.
    • Users reported issues with the user interface freezing up when too many windows are open, the intimidating initial setup of automation, and the lack of certain features such as identity governance and advanced reporting options.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    922
    Device Management
    712
    Integrations
    528
    Security
    528
    User Management
    449
    Cons
    Missing Features
    359
    Improvement Needed
    290
    Limited Features
    228
    UX Improvement
    162
    Limitations
    153
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Reporting
    Average: 8.8
    8.4
    Approval Workflows
    Average: 8.7
    8.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,615 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    918 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a platform that centralizes identity and device management, supports Windows, macOS, and Linux, and integrates with Google Workspace and Microsoft 365.
  • Users frequently mention the ease of managing users and devices from a single platform, the streamlined integration with other applications, and the time-saving automation of tedious tasks.
  • Users reported issues with the user interface freezing up when too many windows are open, the intimidating initial setup of automation, and the lack of certain features such as identity governance and advanced reporting options.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
922
Device Management
712
Integrations
528
Security
528
User Management
449
Cons
Missing Features
359
Improvement Needed
290
Limited Features
228
UX Improvement
162
Limitations
153
JumpCloud features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.5
Reporting
Average: 8.8
8.4
Approval Workflows
Average: 8.7
8.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,615 Twitter followers
LinkedIn® Page
www.linkedin.com
918 employees on LinkedIn®
(789)4.5 out of 5
6th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Microsoft Entra ID
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 39% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    76
    Security
    69
    Identity Management
    54
    Single Sign-On
    48
    SSO (Single Sign-On)
    41
    Cons
    Expensive
    33
    Cost
    20
    Integration Issues
    20
    Missing Features
    17
    Complexity
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,133,301 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 39% Enterprise
  • 38% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
76
Security
69
Identity Management
54
Single Sign-On
48
SSO (Single Sign-On)
41
Cons
Expensive
33
Cost
20
Integration Issues
20
Missing Features
17
Complexity
16
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,133,301 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 56% Enterprise
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Secrets Manager features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.8
    8.9
    Approval Workflows
    Average: 8.7
    7.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,217,364 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

Users
No information available
Industries
  • Computer Software
Market Segment
  • 56% Enterprise
  • 28% Mid-Market
AWS Secrets Manager features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.8
8.9
Approval Workflows
Average: 8.7
7.8
Audit log
Average: 8.7
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,217,364 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(368)4.7 out of 5
4th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 47% Enterprise
    • 35% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BeyondTrust Remote Support is a tool that provides remote access to desktops and other devices for troubleshooting and support purposes.
    • Reviewers like the ease of access to remote desktops, the ability to work on various platforms, the security features such as encryption and auditing, and the quick and efficient support from the BeyondTrust team.
    • Reviewers experienced issues with the outdated interface, the lack of a calling feature, the high cost of the product, and the heavy consumption of system resources, especially on older machines.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Remote Support Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    31
    Remote Access
    31
    Remote Support
    19
    Security
    19
    Security Focus
    19
    Cons
    Expensive
    16
    Pricing Issues
    8
    Remote Access Issues
    6
    Complexity
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Remote Support features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.8
    7.6
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,699 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 47% Enterprise
  • 35% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BeyondTrust Remote Support is a tool that provides remote access to desktops and other devices for troubleshooting and support purposes.
  • Reviewers like the ease of access to remote desktops, the ability to work on various platforms, the security features such as encryption and auditing, and the quick and efficient support from the BeyondTrust team.
  • Reviewers experienced issues with the outdated interface, the lack of a calling feature, the high cost of the product, and the heavy consumption of system resources, especially on older machines.
BeyondTrust Remote Support Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
31
Remote Access
31
Remote Support
19
Security
19
Security Focus
19
Cons
Expensive
16
Pricing Issues
8
Remote Access Issues
6
Complexity
5
Learning Curve
5
BeyondTrust Remote Support features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.8
7.6
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,373 Twitter followers
LinkedIn® Page
www.linkedin.com
1,699 employees on LinkedIn®
(73)4.8 out of 5
2nd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

    Users
    • Information Security Analyst
    Industries
    • Telecommunications
    • Government Administration
    Market Segment
    • 68% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Segura 360° Privilege Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Security
    21
    Customer Support
    12
    Access Management
    9
    Access Control
    5
    Cons
    Expensive
    3
    Steep Learning Curve
    3
    Complex Coding
    2
    Lack of Features
    2
    Limited Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.8
    9.4
    Approval Workflows
    Average: 8.7
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Segura
    Year Founded
    2010
    HQ Location
    São Paulo, São Paulo
    LinkedIn® Page
    www.linkedin.com
    271 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

Users
  • Information Security Analyst
Industries
  • Telecommunications
  • Government Administration
Market Segment
  • 68% Enterprise
  • 22% Mid-Market
Segura 360° Privilege Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Security
21
Customer Support
12
Access Management
9
Access Control
5
Cons
Expensive
3
Steep Learning Curve
3
Complex Coding
2
Lack of Features
2
Limited Reporting
2
Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.8
9.4
Approval Workflows
Average: 8.7
9.4
Audit log
Average: 8.7
Seller Details
Seller
Segura
Year Founded
2010
HQ Location
São Paulo, São Paulo
LinkedIn® Page
www.linkedin.com
271 employees on LinkedIn®
(3,777)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 35% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Salesforce Platform is a customer relationship management software that enables automation, real-time data access, and integration with other tools.
    • Reviewers like the platform's high customizability, scalability, and its ability to streamline processes through automation and seamless tool integration.
    • Reviewers mentioned that the platform can be complex and hard to navigate initially, and that it can feel overwhelming due to frequent updates and endless configuration options.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1,514
    Features
    728
    Customizability
    615
    Customization
    612
    Customization Options
    575
    Cons
    Learning Curve
    528
    Complexity
    480
    Expensive
    452
    Difficult Learning
    379
    Missing Features
    372
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    578,204 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 35% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Salesforce Platform is a customer relationship management software that enables automation, real-time data access, and integration with other tools.
  • Reviewers like the platform's high customizability, scalability, and its ability to streamline processes through automation and seamless tool integration.
  • Reviewers mentioned that the platform can be complex and hard to navigate initially, and that it can feel overwhelming due to frequent updates and endless configuration options.
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1,514
Features
728
Customizability
615
Customization
612
Customization Options
575
Cons
Learning Curve
528
Complexity
480
Expensive
452
Difficult Learning
379
Missing Features
372
Salesforce Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
578,204 Twitter followers
LinkedIn® Page
www.linkedin.com
86,064 employees on LinkedIn®
(59)4.5 out of 5
12th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Remote Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Remote Access
    6
    Ease of Use
    5
    Secure Access
    5
    Security
    4
    Access Control
    2
    Cons
    Access Control
    2
    Poor Navigation
    2
    Steep Learning Curve
    2
    Complex Setup
    1
    Complex Usage
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.8
    8.9
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,699 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 39% Enterprise
BeyondTrust Privileged Remote Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Remote Access
6
Ease of Use
5
Secure Access
5
Security
4
Access Control
2
Cons
Access Control
2
Poor Navigation
2
Steep Learning Curve
2
Complex Setup
1
Complex Usage
1
BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.8
8.9
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,373 Twitter followers
LinkedIn® Page
www.linkedin.com
1,699 employees on LinkedIn®
(46)4.4 out of 5
Optimized for quick response
8th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

    Users
    • Cloud Operations Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSH PrivX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    14
    Secure Access
    11
    Customer Support
    8
    Accessibility
    7
    Cons
    Integration Difficulty
    12
    Complex Setup
    8
    Limited OS Compatibility
    4
    Poor Documentation
    4
    UX Improvement
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH PrivX features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Reporting
    Average: 8.8
    8.5
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,376 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

Users
  • Cloud Operations Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 28% Mid-Market
SSH PrivX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
14
Secure Access
11
Customer Support
8
Accessibility
7
Cons
Integration Difficulty
12
Complex Setup
8
Limited OS Compatibility
4
Poor Documentation
4
UX Improvement
4
SSH PrivX features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
7.9
Reporting
Average: 8.8
8.5
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,376 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
(43)4.5 out of 5
15th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Password Safe Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Password Management
    6
    Secure Access
    6
    Security
    6
    Accessibility
    5
    Cons
    Complex Setup
    4
    Setup Difficulty
    3
    Integration Difficulty
    2
    Lack of Features
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Password Safe features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.8
    8.6
    Approval Workflows
    Average: 8.7
    8.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,699 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
BeyondTrust Password Safe Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Password Management
6
Secure Access
6
Security
6
Accessibility
5
Cons
Complex Setup
4
Setup Difficulty
3
Integration Difficulty
2
Lack of Features
2
Poor Customer Support
2
BeyondTrust Password Safe features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.8
8.6
Approval Workflows
Average: 8.7
8.4
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,373 Twitter followers
LinkedIn® Page
www.linkedin.com
1,699 employees on LinkedIn®
(23)4.1 out of 5
13th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 52% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Endpoint Privilege Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Accessibility
    2
    Ease of Configuration
    2
    Secure Access
    2
    Security
    2
    Cons
    Setup Difficulty
    2
    Expensive
    1
    Implementation Difficulty
    1
    Integration Difficulty
    1
    Poor Administration Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,699 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

Users
No information available
Industries
No information available
Market Segment
  • 52% Enterprise
  • 43% Mid-Market
BeyondTrust Endpoint Privilege Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Accessibility
2
Ease of Configuration
2
Secure Access
2
Security
2
Cons
Setup Difficulty
2
Expensive
1
Implementation Difficulty
1
Integration Difficulty
1
Poor Administration Management
1
BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,373 Twitter followers
LinkedIn® Page
www.linkedin.com
1,699 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HashiCorp Vault Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Management
    1
    Integrations
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.8
    9.4
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    100,553 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,343 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 35% Enterprise
HashiCorp Vault Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Easy Management
1
Integrations
1
Cons
Expensive
1
HashiCorp Vault features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.8
9.4
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
100,553 Twitter followers
LinkedIn® Page
www.linkedin.com
2,343 employees on LinkedIn®
Ownership
NASDAQ: HCP
(96)4.6 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:$70.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 15% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • StrongDM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Customer Support
    12
    Easy Integrations
    6
    Easy Management
    6
    Access Control
    4
    Cons
    Documentation
    4
    Integration Issues
    3
    Limited Features
    3
    Setup Difficulty
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StrongDM features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.8
    Reporting
    Average: 8.8
    8.2
    Approval Workflows
    Average: 8.7
    8.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    strongDM
    Company Website
    Year Founded
    2015
    HQ Location
    Burlingame, California
    Twitter
    @strongdm
    759 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    186 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 15% Small-Business
StrongDM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Customer Support
12
Easy Integrations
6
Easy Management
6
Access Control
4
Cons
Documentation
4
Integration Issues
3
Limited Features
3
Setup Difficulty
3
UX Improvement
3
StrongDM features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
7.8
Reporting
Average: 8.8
8.2
Approval Workflows
Average: 8.7
8.7
Audit log
Average: 8.7
Seller Details
Seller
strongDM
Company Website
Year Founded
2015
HQ Location
Burlingame, California
Twitter
@strongdm
759 Twitter followers
LinkedIn® Page
www.linkedin.com
186 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.8
    9.0
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.8
9.0
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,642 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec PAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Cons
    Complex Setup
    1
    Time Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec PAM features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.8
    6.9
    Approval Workflows
    Average: 8.7
    7.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 32% Mid-Market
Symantec PAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Cons
Complex Setup
1
Time Delays
1
Symantec PAM features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.8
6.9
Approval Workflows
Average: 8.7
7.3
Audit log
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,454 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
(28)4.3 out of 5
View top Consulting Services for Google Cloud Identity & Access Management (IAM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 57% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Features
    2
    Integrations
    2
    Cloud Services
    1
    Cloud Storage
    1
    Cons
    Complexity
    1
    Cost Issues
    1
    Difficulty Level
    1
    Limited Features
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.7
    Reporting
    Average: 8.8
    9.7
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,497,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 57% Small-Business
  • 25% Enterprise
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Features
2
Integrations
2
Cloud Services
1
Cloud Storage
1
Cons
Complexity
1
Cost Issues
1
Difficulty Level
1
Limited Features
1
Poor Interface Design
1
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.7
Reporting
Average: 8.8
9.7
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,497,617 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG

Learn More About Privileged Access Management (PAM) Software

What is Privileged Access Management Software?

When managing user accounts, companies should set a clear divide between customer-generated accounts and internal ones. The benefit of doing this is twofold. First, customer accounts and internal users have vastly different needs and requirements for your business. Second, compartmentalization helps prevent cross-contamination. More simply, if something goes wrong in your customer account management system, it won’t affect your internal account management system or vice versa.

Thankfully, different management systems exist specifically to focus on customer account management and internal accounts. While customer identity and access management (CIAM) software is built for handling your business’ customer-facing accounts and account security, privileged access management (PAM) software focuses on managing and securing your business’ own internal user accounts. PAM solutions also differ in a drastic way from CIAM solutions by dealing with access to critical systems (e.g., databases, servers, domains, and networks) as well as handling IT admin accounts.

Key Benefits of Privileged Access Management Software

  • Manage employee access privileges to key business systems
  • Centralize storage of employee information
  • Monitor employee behavior, web-based threats, and unapproved internal actors
  • Customize access privileges for users
  • Monitor employee account behavior

Why Use Privileged Access Management Software?

There are many security benefits to PAM solutions. Older methods of key sharing and word-of-mouth communication are not sufficient in protecting information and business-critical systems. These tools will help security professionals and administrative personnel better track who in their organization has access to what and may document their actions or behaviors within privileged systems or applications.

Security — Privileged access management tools centralize the storage credentials and administration of access. Without IAM tools, this data can be more vulnerable to threats if it is not properly safeguarded. IAM tools are fortified with authentication features to limit viewing to only those administrators with granted access. These tools will also provide alerts for potential threats or users who have accessed sensitive data without permission.

Administration — Administrators can create databases, document user account histories, and view approved privileges, all of which helps to simplify the onboarding process. Administrators can quickly create new accounts and approve applications for new users to access. Some products even offer templates to have ready when adding employees to specific roles. The same goes for those no longer employed; administrators can quickly restrict their privileges or delete their account.

Cloud application management — Many cloud applications have the ability to connect dozens of applications, user credentials, and access privileges. Large, enterprise-sized companies will benefit greatly from having a cloud-based database that securely contains this sensitive data. Many products come with prebuilt integrations for hundreds of applications, while others may require customization or simply offer a limited variety of applications.

Who Uses Privileged Access Management Software?

Administrative professionals — Administrators—typically security administrators—will most often be the ones using privileged access management solutions. Other system admins may find use in PAM solutions as well, since certain roles may need more or less access to different business systems, pending their role.

Service providers — Third-party service providers will often manage cloud services directly and may need to integrate with other business systems or networks. Privileged access management tools allow for role-based access control to limit what information and systems can be accessed by third-party services providers or other external entities requiring access to sensitive information or business-critical systems.

Human resources — HR professionals may use privileged access management solutions to delegate access to internal employees or new hires during the onboarding process. Many PAM tools integrate with directory services and identity servers and other identity management solutions to integrate identity information and simplify privileged account management. These accounts may be set up for access to applications, cloud services, databases, or any other IT system requiring privileged access.

Internal employees — These are the end users accessing applications and networks by the allowance of administrative or security staff. These individuals may only interact with the PAM solution in that they use the credentials to access information. But some tools may provide a dashboard or access portal with information about what applications, networks, services, and databases they have been approved to access.

Privileged Access Management Software Features

These are a few common features of privileged access management software.

Local access — Local access functionality facilitates administrative access to on-premises systems, legacy applications, web-based applications, network resources, and servers.

Multi-factor authentication (MFA) — MFA or 2FA functionality adds a supplementary level of security for systems by requiring SMS codes, security questions, or other verification methods before granting access.

Bulk changes — Bulk change functionality can simplify the administration, federation, and identity governance of individuals in large amounts through batch update capabilities.

Self-service access requests — Self-service features allow users to request access to applications, networks, or databases, automatically provisioning individuals if they meet policy requirements.

Partner access — Local access functionality facilitates administrative access to users who are not company employees but are either within the company’s local area network or outside the network.

BYOD support — Bring-your-own-device (BYOD) features enable users to use their own device(s) to access company applications.

Bidirectional profile synchronization — Synchronization keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application.

Policy management — This feature enables administrators to create access requirements and standards while applying policy controls throughout request and provisioning processes.

Role management — Role management features help administrators establish roles that provide authentication and access rights for each user in the role.

Approval workflows — Process and approval workflows allow business stakeholders and administrators to approve or reject requested changes to access via a defined workflow.

Compliance audits — Auditing features allow for standards and policies to be established while proactively auditing access rights against predefined requirements.

Smart provisioning — Self-learning or automated provisioning helps to reduce the amount of manual work associated with creating access rights, as well as managing changes and removals for on-premises and cloud-based applications.

Potential Issues with Privileged Access Management Software

Security — Security is always a concern, especially with technologies specialized in protecting sensitive information. Individuals should be sure the administration of PAM software is controlled only by trusted individuals. Integrations with cloud services should be secure, and businesses should read the fine print on service provider contracts to ensure their security standards are sufficient. Without proper security protocols in place, systems may be vulnerable to data breaches, privilege escalation, and dozens of other web-based threats from both internal and external actors.

Compliance requirements — New compliance requirements are emerging across the globe. As this occurs, it’s important to remain adaptable in planning to secure, store, and deliver sensitive information in compliance with international regulations. Compliance management features will help to audit identity stores and servers to ensure each person is properly documented and their sensitive data is stored securely. Compliance auditing tools are also great add-ons for ad-hoc compliance checks and can be helpful in general to ensure a well-rounded security system is in place.

Device compatibility — End-user devices pose potential security risks if they are not compatible with identity management tools. They also pose a threat if they are not properly updated, patched, and protected in general. Device compatibility, support for servers, virtual environments and any other system requiring privileged access should be documented and integrated with systems to ensure every device is properly protected.