Best Privileged Access Management (PAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts

Best Privileged Access Management (PAM) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
148 Listings in Privileged Access Management (PAM) Available
(787)4.5 out of 5
3rd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    214
    Security
    193
    Identity Management
    134
    Single Sign-On
    122
    SSO (Single Sign-On)
    103
    Cons
    Expensive
    68
    Authentication Issues
    47
    Complexity
    46
    Integration Issues
    43
    Missing Features
    42
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.6
    8.8
    Approval Workflows
    Average: 8.6
    9.1
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,938,794 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    244,190 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
214
Security
193
Identity Management
134
Single Sign-On
122
SSO (Single Sign-On)
103
Cons
Expensive
68
Authentication Issues
47
Complexity
46
Integration Issues
43
Missing Features
42
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.6
8.8
Approval Workflows
Average: 8.6
9.1
Audit log
Average: 8.6
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,938,794 Twitter followers
LinkedIn® Page
www.linkedin.com
244,190 employees on LinkedIn®
Ownership
MSFT
(2,974)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$9.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to

    Users
    • IT Manager
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a cloud directory program that combines directory services, single sign-on (SSO), multi-factor authentication (MFA), and device management into one platform, aiming to simplify user management, system provisioning, and authentication across multiple systems.
    • Reviewers like JumpCloud's comprehensive approach to identity and access management, its ability to unify user management across various platforms, its robust security features, and its user-friendly interface that simplifies administrative tasks.
    • Users experienced some issues with JumpCloud, such as a complex user interface for those unfamiliar with identity management systems, lack of flexibility and pre-built templates for certain devices, and some features not working properly when offline.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    729
    Device Management
    513
    Security
    329
    Integrations
    326
    Easy Integrations
    284
    Cons
    Missing Features
    265
    Improvement Needed
    226
    Limited Features
    150
    Lack of Features
    105
    Poor User Interface
    101
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Reporting
    Average: 8.6
    8.4
    Approval Workflows
    Average: 8.6
    8.5
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    37,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    828 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to

Users
  • IT Manager
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a cloud directory program that combines directory services, single sign-on (SSO), multi-factor authentication (MFA), and device management into one platform, aiming to simplify user management, system provisioning, and authentication across multiple systems.
  • Reviewers like JumpCloud's comprehensive approach to identity and access management, its ability to unify user management across various platforms, its robust security features, and its user-friendly interface that simplifies administrative tasks.
  • Users experienced some issues with JumpCloud, such as a complex user interface for those unfamiliar with identity management systems, lack of flexibility and pre-built templates for certain devices, and some features not working properly when offline.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
729
Device Management
513
Security
329
Integrations
326
Easy Integrations
284
Cons
Missing Features
265
Improvement Needed
226
Limited Features
150
Lack of Features
105
Poor User Interface
101
JumpCloud features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.4
Reporting
Average: 8.6
8.4
Approval Workflows
Average: 8.6
8.5
Audit log
Average: 8.6
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
37,316 Twitter followers
LinkedIn® Page
www.linkedin.com
828 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 43% Enterprise
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Secrets Manager features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    8.9
    Approval Workflows
    Average: 8.6
    7.8
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,221,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

Users
No information available
Industries
  • Computer Software
Market Segment
  • 43% Enterprise
  • 22% Mid-Market
AWS Secrets Manager features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
8.9
Approval Workflows
Average: 8.6
7.8
Audit log
Average: 8.6
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,221,081 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(345)4.7 out of 5
5th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for organizations that need to securely access and support any device or system, anywhere in the world. Technicians using

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 49% Enterprise
    • 34% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BeyondTrust Remote Support is a remote support tool that allows technicians to securely access and support devices or systems remotely.
    • Users like the robust security features, seamless integration with various systems, and the ability to support any user device within their network or any other network, across all operating systems.
    • Reviewers experienced issues with the high cost of the software, particularly for smaller businesses, and some found the initial setup and configuration to be complex and time-consuming.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Remote Support Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Remote Access
    41
    Security Focus
    23
    Security
    22
    Remote Support
    19
    Cons
    Expensive
    18
    Pricing Issues
    7
    Remote Access Issues
    7
    Complexity
    6
    Connectivity Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Remote Support features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.6
    7.6
    Approval Workflows
    Average: 8.6
    9.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,595 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for organizations that need to securely access and support any device or system, anywhere in the world. Technicians using

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 49% Enterprise
  • 34% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BeyondTrust Remote Support is a remote support tool that allows technicians to securely access and support devices or systems remotely.
  • Users like the robust security features, seamless integration with various systems, and the ability to support any user device within their network or any other network, across all operating systems.
  • Reviewers experienced issues with the high cost of the software, particularly for smaller businesses, and some found the initial setup and configuration to be complex and time-consuming.
BeyondTrust Remote Support Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Remote Access
41
Security Focus
23
Security
22
Remote Support
19
Cons
Expensive
18
Pricing Issues
7
Remote Access Issues
7
Complexity
6
Connectivity Issues
5
BeyondTrust Remote Support features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.6
7.6
Approval Workflows
Average: 8.6
9.0
Audit log
Average: 8.6
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,583 Twitter followers
LinkedIn® Page
www.linkedin.com
1,595 employees on LinkedIn®
(55)4.8 out of 5
2nd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    senhasegura offers a full stack PAM Security Platform that manages the entire Privilege Access lifecycle. Available on-premises or on Cloud environments, senhasegura reduces privilege access surface a

    Users
    No information available
    Industries
    • Government Administration
    • Telecommunications
    Market Segment
    • 65% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • senhasegura Privileged Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    32
    Security
    18
    Customer Support
    14
    Access Management
    12
    Flexibility
    7
    Cons
    Documentation
    5
    Poor User Interface
    5
    Expensive
    4
    Poor Documentation
    4
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • senhasegura Privileged Access Management features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Reporting
    Average: 8.6
    9.4
    Approval Workflows
    Average: 8.6
    9.5
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    São Paulo, São Paulo
    Twitter
    @senha_segura
    463 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

senhasegura offers a full stack PAM Security Platform that manages the entire Privilege Access lifecycle. Available on-premises or on Cloud environments, senhasegura reduces privilege access surface a

Users
No information available
Industries
  • Government Administration
  • Telecommunications
Market Segment
  • 65% Enterprise
  • 24% Mid-Market
senhasegura Privileged Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
32
Security
18
Customer Support
14
Access Management
12
Flexibility
7
Cons
Documentation
5
Poor User Interface
5
Expensive
4
Poor Documentation
4
Lack of Features
3
senhasegura Privileged Access Management features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.3
Reporting
Average: 8.6
9.4
Approval Workflows
Average: 8.6
9.5
Audit log
Average: 8.6
Seller Details
Year Founded
2010
HQ Location
São Paulo, São Paulo
Twitter
@senha_segura
463 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(82)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$70.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 76% Mid-Market
    • 15% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • StrongDM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Customer Support
    18
    Easy Integrations
    9
    Access Control
    8
    Auditing
    6
    Cons
    Poor User Interface
    7
    Access Permissions
    5
    Audit Logging Issues
    5
    Expensive
    5
    Lack of Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StrongDM features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    7.6
    Reporting
    Average: 8.6
    7.9
    Approval Workflows
    Average: 8.6
    8.8
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    strongDM
    Company Website
    Year Founded
    2015
    HQ Location
    Burlingame, California
    Twitter
    @strongdm
    870 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 76% Mid-Market
  • 15% Small-Business
StrongDM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Customer Support
18
Easy Integrations
9
Access Control
8
Auditing
6
Cons
Poor User Interface
7
Access Permissions
5
Audit Logging Issues
5
Expensive
5
Lack of Features
5
StrongDM features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
7.6
Reporting
Average: 8.6
7.9
Approval Workflows
Average: 8.6
8.8
Audit log
Average: 8.6
Seller Details
Seller
strongDM
Company Website
Year Founded
2015
HQ Location
Burlingame, California
Twitter
@strongdm
870 Twitter followers
LinkedIn® Page
www.linkedin.com
143 employees on LinkedIn®
(82)4.5 out of 5
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    588,618 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
588,618 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
Ownership
NYSE:CRM
(48)4.4 out of 5
View top Consulting Services for Google Cloud Identity & Access Management (IAM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 25% Small-Business
    • 15% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Access Control
    4
    Easy Integrations
    3
    Flexibility
    3
    Admin Control
    2
    Cons
    Access Control
    1
    Complexity
    1
    Complex Setup
    1
    Difficulty Locating
    1
    Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.7
    Reporting
    Average: 8.6
    9.7
    Approval Workflows
    Average: 8.6
    9.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,136,453 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    302,978 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 25% Small-Business
  • 15% Enterprise
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Access Control
4
Easy Integrations
3
Flexibility
3
Admin Control
2
Cons
Access Control
1
Complexity
1
Complex Setup
1
Difficulty Locating
1
Documentation
1
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
9.7
Reporting
Average: 8.6
9.7
Approval Workflows
Average: 8.6
9.0
Audit log
Average: 8.6
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,136,453 Twitter followers
LinkedIn® Page
www.linkedin.com
302,978 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec PAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Cons
    Complex Setup
    1
    Time Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec PAM features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.6
    6.9
    Approval Workflows
    Average: 8.6
    7.3
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    57,683 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 32% Mid-Market
Symantec PAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Cons
Complex Setup
1
Time Delays
1
Symantec PAM features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.6
6.9
Approval Workflows
Average: 8.6
7.3
Audit log
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
57,683 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 81% Enterprise
    • 15% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PingAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Secure Access
    10
    Ease of Use
    9
    MFA Security
    7
    Single Sign-On
    6
    Automation
    4
    Cons
    Authentication Issues
    6
    Time Delays
    6
    Poor User Interface
    3
    Connectivity Issues
    2
    Limited Mobile Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingAccess features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.6
    8.7
    Approval Workflows
    Average: 8.6
    8.5
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    43,105 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,923 employees on LinkedIn®
    Phone
    1.303.468.2900
Users
No information available
Industries
  • Accounting
Market Segment
  • 81% Enterprise
  • 15% Small-Business
PingAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Secure Access
10
Ease of Use
9
MFA Security
7
Single Sign-On
6
Automation
4
Cons
Authentication Issues
6
Time Delays
6
Poor User Interface
3
Connectivity Issues
2
Limited Mobile Support
1
PingAccess features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.6
8.7
Approval Workflows
Average: 8.6
8.5
Audit log
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
43,105 Twitter followers
LinkedIn® Page
www.linkedin.com
1,923 employees on LinkedIn®
Phone
1.303.468.2900
(17)4.5 out of 5
15th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Conjur Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Services
    1
    Security
    1
    Useful
    1
    Cons
    Improvements Needed
    1
    Inadequate Tracking
    1
    Inefficiency
    1
    User Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.6
    9.0
    Approval Workflows
    Average: 8.6
    9.2
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Services
1
Security
1
Useful
1
Cons
Improvements Needed
1
Inadequate Tracking
1
Inefficiency
1
User Difficulty
1
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.6
9.0
Approval Workflows
Average: 8.6
9.2
Audit log
Average: 8.6
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,125 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(30)4.7 out of 5
13th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    8
    Insights
    8
    Customer Support
    7
    Detailed Analysis
    6
    Cons
    Limited Features
    5
    Feature Limitations
    4
    Missing Features
    4
    Improvement Needed
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.6
    9.2
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,058 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
8
Insights
8
Customer Support
7
Detailed Analysis
6
Cons
Limited Features
5
Feature Limitations
4
Missing Features
4
Improvement Needed
3
Lack of Features
3
Tenable Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.6
9.2
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,058 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 94% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    12
    Reliability
    8
    Password Management
    7
    Auditing
    5
    Cons
    Complexity
    5
    Poor User Interface
    5
    Difficult Setup
    4
    Limited Reporting
    4
    Poor Customer Support
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Reporting
    Average: 8.6
    8.8
    Approval Workflows
    Average: 8.6
    9.2
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 94% Enterprise
  • 34% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
12
Reliability
8
Password Management
7
Auditing
5
Cons
Complexity
5
Poor User Interface
5
Difficult Setup
4
Limited Reporting
4
Poor Customer Support
4
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.0
Reporting
Average: 8.6
8.8
Approval Workflows
Average: 8.6
9.2
Audit log
Average: 8.6
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,125 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(104)4.5 out of 5
Optimized for quick response
14th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teleport is a global provider of modern access platforms for infrastructure, improving efficiency of engineering teams, fortifying infrastructure against bad actors or error, and simplifying complian

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teleport Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    59
    Security
    40
    Access Control
    30
    Reliability
    27
    Easy Management
    21
    Cons
    Poor Documentation
    21
    Documentation
    19
    Difficult Setup
    15
    Missing Features
    13
    Expensive
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teleport features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.6
    8.2
    Approval Workflows
    Average: 8.6
    8.9
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teleport
    Company Website
    Year Founded
    2015
    HQ Location
    Oakland, California
    Twitter
    @goteleport
    3,854 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    189 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teleport is a global provider of modern access platforms for infrastructure, improving efficiency of engineering teams, fortifying infrastructure against bad actors or error, and simplifying complian

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Teleport Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
59
Security
40
Access Control
30
Reliability
27
Easy Management
21
Cons
Poor Documentation
21
Documentation
19
Difficult Setup
15
Missing Features
13
Expensive
12
Teleport features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.6
8.2
Approval Workflows
Average: 8.6
8.9
Audit log
Average: 8.6
Seller Details
Seller
Teleport
Company Website
Year Founded
2015
HQ Location
Oakland, California
Twitter
@goteleport
3,854 Twitter followers
LinkedIn® Page
www.linkedin.com
189 employees on LinkedIn®
(31)4.4 out of 5
11th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 45% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Remote Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Management
    1
    Ease of Use
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.6
    9.3
    Approval Workflows
    Average: 8.6
    9.4
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,583 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,595 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 45% Enterprise
BeyondTrust Privileged Remote Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Management
1
Ease of Use
1
Cons
This product has not yet received any negative sentiments.
BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.6
9.3
Approval Workflows
Average: 8.6
9.4
Audit log
Average: 8.6
Seller Details