# Best Enterprise Privileged Access Management (PAM) Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Privileged Access Management (PAM) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Privileged Access Management (PAM) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Privileged Access Management (PAM) category.

In addition to qualifying for inclusion in the Privileged Access Management (PAM) Software category, to qualify for inclusion in the Enterprise Business Privileged Access Management (PAM) Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 155


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 11,900+ Authentic Reviews
- 155+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### BeyondTrust Privileged Remote Access

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access



[Visit company website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=paid_promo&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1252&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=15211&amp;secure%5Bresource_id%5D=1252&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fprivileged-access-management-pam%2Fenterprise&amp;secure%5Btoken%5D=fb2e6e3fa311f81774a7cc18acdf389cbdfd33233ee0f78de6403f8b5b4c8ef8&amp;secure%5Burl%5D=https%3A%2F%2Fwww.beyondtrust.com%2Fproducts%2Fprivileged-remote-access&amp;secure%5Burl_type%5D=paid_promos)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 864

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.8/10 (Category avg: 8.8/10)
- **Audit log:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

  ### 2. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,805

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.4/10 (Category avg: 8.8/10)
- **Audit log:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,489 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (881 reviews)
- Device Management (664 reviews)
- Security (519 reviews)
- Integrations (482 reviews)
- Features (431 reviews)

**Cons:**

- Missing Features (382 reviews)
- Improvement Needed (301 reviews)
- Limited Features (235 reviews)
- Limitations (177 reviews)
- Learning Curve (156 reviews)

  ### 3. [Segura 360° Privilege Platform](https://www.g2.com/products/segura-360-privilege-platform/reviews)
  Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, helping organizations protect and manage privileged identities across hybrid and cloud environments. Segura supports use cases like credential vaulting, session monitoring, least privilege enforcement, and secrets management for DevOps and cloud workloads. The company operates globally and, together with its network of partners, serves organizations across banking, telecom, government, and critical infrastructure sectors.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 73

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.4/10 (Category avg: 8.8/10)
- **Audit log:** 9.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Segura](https://www.g2.com/sellers/segura)
- **Year Founded:** 2010
- **HQ Location:** São Paulo, São Paulo
- **LinkedIn® Page:** https://www.linkedin.com/company/senhasegura/ (277 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Information Security Analyst
  - **Top Industries:** Telecommunications, Government Administration
  - **Company Size:** 68% Enterprise, 23% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Security (14 reviews)
- Customer Support (9 reviews)
- Access Management (8 reviews)
- Data Security (4 reviews)

**Cons:**

- Complex Coding (2 reviews)
- Limited Reporting (2 reviews)
- Poor Reporting (2 reviews)
- Setup Difficulty (2 reviews)
- Steep Learning Curve (2 reviews)

  ### 4. [SSH PrivX](https://www.g2.com/products/ssh-privx/reviews)
  PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threats become increasingly sophisticated, PrivX provides a scalable and cost-effective approach to safeguarding critical assets while ensuring compliance with various regulatory standards. Targeted primarily at IT administrators, security teams, and organizations operating within complex cloud infrastructures, PrivX is adaptable for businesses of all sizes. Its versatility allows for a range of use cases, including secure remote access for third-party vendors, management of cloud resource access, and facilitation of secure DevOps workflows. By streamlining privileged access management, PrivX effectively mitigates the risk of unauthorized access and potential data breaches, which are critical concerns for modern enterprises. PrivX boasts several core features that enhance its functionality. Automated password vaulting securely stores and manages credentials, ensuring that sensitive information is protected from unauthorized access. Additionally, the password rotation feature automatically updates passwords, maintaining strong security hygiene and significantly reducing the risks associated with credential theft. Another key aspect of PrivX is its passwordless authentication capability, which allows users to access systems securely without relying on traditional passwords, thereby minimizing the chances of falling victim to phishing attacks. A notable differentiator of PrivX is its quantum-safe connections, designed to protect data against the future risks posed by quantum computing. This forward-thinking feature ensures secure communications between users and systems, enhancing long-term security resilience. By incorporating such advanced security measures, PrivX not only addresses current security challenges but also prepares organizations for emerging threats. The combination of automation, scalability, and cutting-edge security features—such as quantum-safe encryption and passwordless access—positions PrivX as a compelling solution in the PAM landscape. By implementing PrivX, organizations can gain tighter control over privileged access, reduce administrative overhead, and improve compliance with regulatory requirements. This makes PrivX a practical and forward-looking choice for modern access management needs, enabling organizations to navigate the complexities of today’s digital landscape with confidence.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 51

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 7.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.6/10 (Category avg: 8.8/10)
- **Audit log:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [SSH Communications Security](https://www.g2.com/sellers/ssh-communications-security)
- **Company Website:** https://www.ssh.com
- **Year Founded:** 1995
- **HQ Location:** Helsinki, FI
- **Twitter:** @SSH (3,365 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10860 (527 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Cloud Operations Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 44% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (18 reviews)
- Security (16 reviews)
- Secure Access (13 reviews)
- Customer Support (9 reviews)
- Accessibility (8 reviews)

**Cons:**

- Integration Difficulty (12 reviews)
- Complex Setup (10 reviews)
- Limited OS Compatibility (4 reviews)
- Poor Documentation (4 reviews)
- Poor Reporting (4 reviews)

  ### 5. [BeyondTrust Password Safe](https://www.g2.com/products/beyondtrust-password-safe/reviews)
  BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and secrets. Password Safe drives automated credential and secrets management, real-time session management &amp; monitoring, and advanced auditing &amp; forensics capabilities – all while enabling zero trust. Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Password Safe: https://www.beyondtrust.com/products/password-safe


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 45

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.7/10 (Category avg: 8.8/10)
- **Audit log:** 8.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 54% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (11 reviews)
- Security (10 reviews)
- Auditing (9 reviews)
- Password Management (9 reviews)
- Secure Access (9 reviews)

**Cons:**

- Complex Setup (7 reviews)
- Expensive (3 reviews)
- Poor Reporting (3 reviews)
- Setup Difficulty (3 reviews)
- Steep Learning Curve (3 reviews)

  ### 6. [BeyondTrust Remote Support](https://www.g2.com/products/beyondtrust-remote-support/reviews)
  BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not. Service desks are provided with everything they need, end-to-end: centralized controls, remote access, automated scripts, encrypted file sharing, chat and collaboration for end-users and technicians, and live dashboards for KPIs and metric reporting. Organizations in all vertical markets around the globe use Remote Support to deliver superior support services and reduce threats to valuable data and systems. BeyondTrust is privately held and headquartered in Atlanta, GA with offices and channel partners around the world. Connect with BeyondTrust at www.beyondtrust.com, the BeyondTrust Blog, or on Facebook, Twitter and LinkedIn. Get a Free Trial: https://www.beyondtrust.com/remote-support/trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Remote Support: https://www.beyondtrust.com/products/remote-support


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 377

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 9.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 7.6/10 (Category avg: 8.8/10)
- **Audit log:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 47% Enterprise, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (26 reviews)
- Remote Access (18 reviews)
- Remote Support (15 reviews)
- Reliability (11 reviews)
- Security (11 reviews)

**Cons:**

- Expensive (10 reviews)
- Pricing Issues (8 reviews)
- Complexity (6 reviews)
- Learning Curve (6 reviews)
- Remote Access Issues (6 reviews)

  ### 7. [BeyondTrust Endpoint Privilege Management](https://www.g2.com/products/beyondtrust-endpoint-privilege-management/reviews)
  BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance reporting for all endpoints. With best-in-class capabilities across Windows, macOS, Unix, and Linux, EPM supports the zero-trust journey by addressing key principles such as least privilege and zero standing privilege. BeyondTrust EPM enables IT and security teams to elevate application permissions without granting full admin rights, minimizing risk while maintaining productivity. Detailed audit logs help businesses easily meet cyber-insurance requirements while improving visibility and the ability to efficiently manage multi-platform infrastructures. As part of the BeyondTrust platform, EPM integrates seamlessly with a full range of security solutions to protect identities, stop threats, and ensure secure, dynamic access across diverse IT environments. Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Endpoint Privilege Management: https://www.beyondtrust.com/products/endpoint-privilege-management


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.5/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 52% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (4 reviews)
- Accessibility (3 reviews)
- Auditing (3 reviews)
- Policy Management (3 reviews)
- Security (3 reviews)

**Cons:**

- Setup Difficulty (2 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)
- Implementation Difficulty (1 reviews)
- Integration Difficulty (1 reviews)

  ### 8. [Delinea Secret Server](https://www.g2.com/products/delinea-secret-server/reviews)
  Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winning enterprise-grade software gives security and IT leaders the agility to vault and manage all types of privileges, protecting administrator, service, application, and root accounts from cyber criminals. Secret Server empowers organizations of any size to improve security posture, minimize complexity, and increase security policy adoption more seamlessly than any other PAM solution. Secret Server is the end-to-end PAM solution that ensures secure privileged account credentials and is available on-premise or in the cloud on the Delinea Platform. This robust and scalable PAM solution is recognized as easy to use and deploy, offering the fastest time to value of any PAM solution.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 8.8/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.2/10 (Category avg: 8.8/10)
- **Audit log:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Delinea](https://www.g2.com/sellers/delinea)
- **Year Founded:** 2004
- **HQ Location:** San Francisco
- **Twitter:** @DelineaInc (885 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/delinea/ (1,232 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 60% Mid-Market, 33% Enterprise


#### Pros & Cons

**Pros:**

- Password Management (1 reviews)
- Security (1 reviews)

**Cons:**

- Complex Usage (1 reviews)
- Setup Difficulty (1 reviews)

  ### 9. [Agentforce 360 Platform (formerly Salesforce Platform)](https://www.g2.com/products/agentforce-360-platform-formerly-salesforce-platform/reviews)
  Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can execute on your Customer 360 vision, securely, and keep your customer at the center of everything you do. Access a harmonized, unified view of your customers, automate manual, inefficient processes to drive productivity, and empower your employees to deliver a seamless, connected customer experience. Accelerate your Salesforce development, increase developer efficiency, and save on IT costs with the Salesforce platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,774

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Approval Workflows:** 10.0/10 (Category avg: 8.8/10)
- **Audit log:** 10.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Salesforce](https://www.g2.com/sellers/salesforce)
- **Company Website:** https://www.salesforce.com/
- **Year Founded:** 1999
- **HQ Location:** San Francisco, CA
- **Twitter:** @salesforce (581,281 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3185/ (88,363 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Salesforce Developer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 45% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (1639 reviews)
- Features (799 reviews)
- Customization (674 reviews)
- Customizability (670 reviews)
- Customization Options (630 reviews)

**Cons:**

- Learning Curve (574 reviews)
- Complexity (539 reviews)
- Expensive (485 reviews)
- Difficult Learning (413 reviews)
- Missing Features (412 reviews)

  ### 10. [Saviynt](https://www.g2.com/products/saviynt-saviynt/reviews)
  Saviynt helps organizations transform their organization with identity security. Our AI-first platform enables enterprises to secure every identity — human, non-human, and AI — within any application and in any environment. With Saviynt, organizations strengthen their identity security posture, streamline operations, and ensure that every user has the right access at the right time. The Saviynt Identity Platform unifies identity governance (IGA), application access, cloud security, and privileged account management into a single, end-to-end platform. And, with our AI-powered recommendation engine, application onboarding, and more, users are empowered to make faster, smarter, data-driven decisions. In turn, organizations enjoy lower risk, complete visibility and governance, reduced total cost of ownership, and much more throughout their entire identity security program.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 77

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 8.8/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.4/10 (Category avg: 8.8/10)
- **Audit log:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Saviynt](https://www.g2.com/sellers/saviynt)
- **Company Website:** https://www.saviynt.com
- **Year Founded:** 2010
- **HQ Location:** El Segundo, US
- **Twitter:** @saviynt (1,233 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/saviynt (1,579 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Oil &amp; Energy
  - **Company Size:** 80% Enterprise, 5% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (29 reviews)
- Features (23 reviews)
- Easy Setup (13 reviews)
- Customer Support (11 reviews)
- Integrations (11 reviews)

**Cons:**

- Difficult Learning (9 reviews)
- Lack of Features (9 reviews)
- Limited Features (9 reviews)
- Poor Interface Design (9 reviews)
- Complexity (8 reviews)

  ### 11. [IBM Vault (formerly HashiCorp Vault)](https://www.g2.com/products/ibm-vault-formerly-hashicorp-vault/reviews)
  IBM Vault (formerly HashiCorp Vault) tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault&#39;s main use cases include: - Secrets Management - Identity Brokering - Data Encryption


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 9.3/10)
- **Reporting:** 6.7/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.4/10 (Category avg: 8.8/10)
- **Audit log:** 10.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [HashiCorp](https://www.g2.com/sellers/hashicorp)
- **Company Website:** https://www.hashicorp.com/
- **Year Founded:** 2012
- **HQ Location:** San Francisco, CA
- **Twitter:** @hashicorp (102,195 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2830763/ (2,193 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 40% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)
- Easy Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Expensive (1 reviews)

  ### 12. [ARCON | Privileged Access Management (PAM)](https://www.g2.com/products/arcon-privileged-access-management-pam/reviews)
  ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization&#39;s IT infrastructure. By implementing ARCON | PAM, enterprises can effectively mitigate risks associated with unauthorized access, insider threats, and compliance violations. The solution offers a scalable architecture, making it suitable for diverse industries such as banking, healthcare, and government agencies. Key Features and Functionality: - Discovery &amp; Onboarding: Automatically discover and onboard privileged accounts from platforms like Microsoft Active Directory, AWS, Azure, and GCP. This process helps identify and manage orphaned accounts, ensuring comprehensive oversight of all privileged identities. - Multi-Factor Authentication (MFA): Enhance security by enforcing MFA, integrating seamlessly with tools such as Google Authenticator, Microsoft Authenticator, hardware tokens, facial recognition, and biometric authentication. - Single Sign-On (SSO): Simplify access by enabling secure, one-time authentication to multiple applications, supporting protocols like OAuth2.0, OpenID Connect (OIDC), and SAML. - Access Control: Implement the principle of least privilege by granting access based on specific roles and responsibilities, reducing the risk of unauthorized access and data breaches. - Credential Management: Securely manage and protect credentials, SSH keys, and secrets through vaulting, randomization, and retrieval mechanisms, safeguarding critical systems from unauthorized access. - Session Management: Monitor, record, and, if necessary, terminate privileged sessions in real-time, ensuring authorized operations and maintaining audit trails for compliance purposes. Primary Value and Problem Solved: ARCON | PAM addresses the critical need for robust privileged access security by providing organizations with the tools to manage, monitor, and control privileged accounts effectively. By implementing this solution, enterprises can: - Enhance Security: Protect sensitive systems and data from unauthorized access and potential breaches. - Ensure Compliance: Meet regulatory requirements such as PCI-DSS, HIPAA, and GDPR by enforcing stringent access controls and maintaining comprehensive audit trails. - Improve Operational Efficiency: Streamline access management processes, reduce administrative overhead, and facilitate secure remote access, thereby enhancing overall IT efficiency. Trusted by over 1,200 global organizations, ARCON | PAM is recognized for its swift integrations, lower total cost of ownership, and world-class IT support, making it a preferred choice for enterprises seeking to fortify their privileged access management framework.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 26

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 7.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.3/10 (Category avg: 8.8/10)
- **Audit log:** 7.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Arcon](https://www.g2.com/sellers/arcon)
- **Year Founded:** 2006
- **HQ Location:** Mumbai, Maharashtra
- **Twitter:** @ARCONRiskCtrl (1,100 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2403098/ (860 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Consultant
  - **Top Industries:** Information Technology and Services, Insurance
  - **Company Size:** 58% Mid-Market, 42% Enterprise


#### Pros & Cons

**Pros:**

- Accessibility (1 reviews)
- Centralized Management (1 reviews)
- Flexibility (1 reviews)
- Password Management (1 reviews)
- Secure Access (1 reviews)

**Cons:**

- Documentation (1 reviews)
- Integration Difficulty (1 reviews)
- Limited OS Compatibility (1 reviews)
- Poor Documentation (1 reviews)
- Steep Learning Curve (1 reviews)

  ### 13. [BeyondTrust Privileged Remote Access](https://www.g2.com/products/beyondtrust-privileged-remote-access/reviews)
  Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 60

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.9/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Secure Access (8 reviews)
- Security (8 reviews)
- Remote Access (7 reviews)
- Access Control (5 reviews)
- Accessibility (5 reviews)

**Cons:**

- Access Control (2 reviews)
- Lack of Features (2 reviews)
- Poor Navigation (2 reviews)
- Poor Reporting (2 reviews)
- Steep Learning Curve (2 reviews)

  ### 14. [Ping Identity](https://www.g2.com/products/ping-identity/reviews)
  Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The PingOne Cloud Platform provides customers, workforce, and partners with access to cloud, mobile, SaaS, and on-premises applications across the hybrid enterprise. Over half of the Fortune 100 choose us for our identity expertise, open standards, and partnerships with companies including Microsoft and Amazon. We provide flexible identity solutions that accelerate digital business initiatives, delight customers and secure the enterprise. For more information, please visit www.pingidentity.com.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 106

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.2/10 (Category avg: 8.8/10)
- **Audit log:** 8.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Company Website:** https://www.PingIdentity.com
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,126 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 68% Enterprise, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Management (1 reviews)
- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Identity Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)
- Complex Setup (1 reviews)
- Confusing Interface (1 reviews)
- Confusing Options (1 reviews)

  ### 15. [CyberArk Privileged Access Manager](https://www.g2.com/products/cyberark-privileged-access-manager/reviews)
  CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets. CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats. CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well. Customers have 350+ OOTB software integrations available in the CyberArk Marketplace, with over 235 technology vendors, ranging from security technologies, cloud service providers, IoT, OT, and web applications.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 66

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.8/10 (Category avg: 8.8/10)
- **Audit log:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,740 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (5,022 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Banking
  - **Company Size:** 89% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Security (6 reviews)
- Ease of Use (5 reviews)
- Reliability (4 reviews)
- Connectivity (3 reviews)
- Easy Access (3 reviews)

**Cons:**

- Difficult Setup (3 reviews)
- Integration Difficulty (3 reviews)
- Connectivity Issues (2 reviews)
- Integration Issues (2 reviews)
- Lack of Features (2 reviews)

  ### 16. [Akeyless Identity Security Platform](https://www.g2.com/products/akeyless-identity-security-platform/reviews)
  Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers AI-powered identity intelligence to surface risky access and strengthen oversight.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 87

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.5/10 (Category avg: 8.8/10)
- **Audit log:** 8.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Akeyless](https://www.g2.com/sellers/akeyless)
- **Company Website:** https://www.akeyless.io
- **Year Founded:** 2018
- **HQ Location:** Ramat Gan, Israel
- **Twitter:** @akeylessio (285 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/akeyless/ (103 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Security (10 reviews)
- Customer Support (9 reviews)
- Easy Integrations (4 reviews)
- Implementation Ease (4 reviews)

**Cons:**

- Poor Documentation (3 reviews)
- Poor UI (3 reviews)
- Complex Setup (2 reviews)
- Complex Usage (2 reviews)
- Dependency Issues (2 reviews)

  ### 17. [PingAccess](https://www.g2.com/products/pingaccess/reviews)
  PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with identity providers like PingFederate and other OAuth 2.0 and OpenID Connect compliant providers, enabling organizations to implement identity-based access control across their digital assets. Key Features and Functionality: - Centralized Access Control: PingAccess provides a unified platform for managing access policies, ensuring consistent enforcement across all protected resources. - Flexible Deployment Options: It supports various deployment models, including gateway and agent-based architectures, allowing organizations to choose the setup that best fits their infrastructure. - Integration with Identity Providers: PingAccess integrates with identity providers such as PingFederate and other OAuth 2.0 and OIDC compliant providers, facilitating seamless authentication and authorization processes. - Adaptive Authentication: The solution supports adaptive authentication methods, assessing user risk and applying appropriate authentication measures based on contextual factors like device, location, and behavior. - Single Sign-On : PingAccess enables users to access multiple applications with a single set of credentials, enhancing convenience and productivity. Primary Value and Problem Solved: PingAccess addresses the critical need for secure and efficient access management in modern enterprises. By centralizing access control and integrating with existing identity providers, it simplifies the enforcement of security policies, reduces administrative overhead, and enhances the user experience through features like SSO and adaptive authentication. This comprehensive approach helps organizations protect their web applications and APIs from unauthorized access while ensuring compliance with security standards.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 26

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.7/10 (Category avg: 8.8/10)
- **Audit log:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,126 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Accounting
  - **Company Size:** 78% Enterprise, 19% Small-Business


  ### 18. [Devolutions Remote Desktop Manager](https://www.g2.com/products/devolutions-remote-desktop-manager/reviews)
  IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable inventory—complete with Windows, macOS, Linux, and mobile clients—so technicians spend time fixing issues, not hunting connection strings. Highlights at a glance Launch 50 + protocols from one list—no copy-paste required. Keep credentials safe yet handy with shared and personal vaults. Enforce least privilege automatically by linking RBAC to your IdP (Identity Provider). Prove compliance fast with in-depth logs and one-click exports—no custom scripts. The Remote Connection &amp; IT Management package extends that toolbox. Gateway swaps point-to-point VPNs (Virtual Private Networks) for JIT (Just-in-Time) tunnels, while Devolutions Hub (cloud SaaS [Software-as-a-Service]) or an on-premises (on-prem) Devolutions Server supplies central vaulting and role-based access control. Everything flows through RDM’s intuitive UI (User Interface), moving you from ad-hoc fixes to policy-driven access in days, not months. With RDM and the full package in place, your team can manage every session from one console—securely, efficiently, and without workflow disruption.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 193

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.3/10 (Category avg: 8.8/10)
- **Audit log:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Devolutions](https://www.g2.com/sellers/devolutions)
- **Year Founded:** 2010
- **HQ Location:** Lavaltrie, Quebec
- **Twitter:** @DevolutionsInc (1,244 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1533251/ (224 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 42% Small-Business, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Mobile Compatibility (3 reviews)
- Password Management (3 reviews)
- Remote Access (3 reviews)
- Cross-Platform (2 reviews)
- Customer Support (2 reviews)

**Cons:**

- Delay Issues (1 reviews)
- Integration Difficulty (1 reviews)
- Learning Curve (1 reviews)
- Pricing Issues (1 reviews)
- Slow Performance (1 reviews)

  ### 19. [BetterCloud](https://www.g2.com/products/bettercloud/reviews)
  BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on automating essential processes such as onboarding, offboarding, mid-lifecycle changes, give you greater control and insight into your SaaS apps, thousands of forward-thinking organizations rely on BetterCloud to transform employee experience, optimize software spend, and strengthen overall security. By leveraging BetterCloud, organizations can significantly reduce the manual workload associated with SaaS management, achieving up to a 78% reduction in operational tasks. Targeted primarily at IT departments and SaaS operations teams, BetterCloud addresses the challenges faced by organizations that utilize multiple SaaS applications. As businesses increasingly adopt cloud-based solutions, the complexity of managing user access, security policies, and application lifecycles grows. BetterCloud provides a centralized platform that streamlines these processes, ensuring that IT teams can maintain control and compliance while enhancing overall operational efficiency. Key features of BetterCloud include automated user lifecycle management, which simplifies the onboarding and offboarding of employees, ensuring that access rights are promptly granted or revoked as needed. Additionally, the platform offers robust security policy management, allowing organizations to enforce compliance and protect sensitive data across their SaaS ecosystem. BetterCloud also supports mid-lifecycle changes, enabling IT teams to adapt user access as roles and responsibilities evolve within the organization. The benefits of using BetterCloud extend beyond mere automation. By reducing the time spent on repetitive tasks, IT teams can focus on strategic initiatives that drive business growth and innovation. Furthermore, the platform&#39;s ability to provide insights into application usage and security posture empowers organizations to make informed decisions about their SaaS investments. With a strong reputation in the industry, backed by over a decade of experience and recognition from leading analyst firms, BetterCloud stands out as a trusted partner for organizations looking to optimize their SaaS operations. In summary, BetterCloud is not just a tool for managing SaaS applications; it is a strategic solution that transforms the way organizations handle their cloud-based software. By automating critical processes and providing valuable insights, BetterCloud enables IT teams to enhance productivity, improve security, and ultimately drive better business outcomes in a rapidly evolving digital landscape.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 472

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 9.4/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.9/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CORESTACK](https://www.g2.com/sellers/corestack)
- **Company Website:** https://www.corestack.io/
- **Year Founded:** 2016
- **HQ Location:** Bellevue, WA
- **Twitter:** @corestack (1,020 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/corestack (208 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 60% Mid-Market, 28% Enterprise


#### Pros & Cons

**Pros:**

- Automation (47 reviews)
- Ease of Use (42 reviews)
- Onboarding (31 reviews)
- Time-saving (27 reviews)
- Offboarding Process (25 reviews)

**Cons:**

- Limited Features (28 reviews)
- Integration Issues (21 reviews)
- Missing Features (19 reviews)
- Access Limitations (13 reviews)
- Lacking Features (13 reviews)

  ### 20. [Teleport](https://www.g2.com/products/teleport/reviews)
  Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. The Teleport Infrastructure Identity Platform implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. Headquartered in Oakland, CA, Teleport operates globally, with industry-leading customers such as Nasdaq, Moody’s, Adobe, and Elastic.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 109

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.2/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Teleport](https://www.g2.com/sellers/teleport)
- **Year Founded:** 2015
- **HQ Location:** Oakland, California
- **Twitter:** @goteleport (3,804 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/go-teleport/ (264 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 43% Mid-Market, 38% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (47 reviews)
- Security (37 reviews)
- Access Control (29 reviews)
- Reliability (22 reviews)
- Time-saving (20 reviews)

**Cons:**

- Poor Documentation (17 reviews)
- Documentation (15 reviews)
- Missing Features (13 reviews)
- Difficult Setup (12 reviews)
- Complex Administration (10 reviews)

  ### 21. [SecureLink Enterprise Access](https://www.g2.com/products/securelink-enterprise-access/reviews)
  Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. SecureLink Enterprise Access allows you to manage and control the critical access your third parties need to systems, servers, and databases via a single solution, without having to sacrifice efficiency or security.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 54

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.3/10)
- **Reporting:** 9.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.0/10 (Category avg: 8.8/10)
- **Audit log:** 9.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [SecureLink](https://www.g2.com/sellers/securelink)
- **Year Founded:** 2003
- **HQ Location:** Austin, TX
- **Twitter:** @securelink (42 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/101420/ (130 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 56% Enterprise, 43% Mid-Market




## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools)
- [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)
- [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)



---

## Buyer Guide

### What You Should Know About Privileged Access Management Software

### What is Privileged Access Management Software?

When managing user accounts, companies should set a clear divide between customer-generated accounts and internal ones. The benefit of doing this is twofold. First, customer accounts and internal users have vastly different needs and requirements for your business. Second, compartmentalization helps prevent cross-contamination. More simply, if something goes wrong in your customer account management system, it won’t affect your internal account management system or vice versa.

Thankfully, different management systems exist specifically to focus on customer account management and internal accounts. While [customer identity and access management (CIAM) software](http://g2.com/categories/customer-identity-and-access-management) is built for handling your business’ customer-facing accounts and account security, privileged access management (PAM) software focuses on managing and securing your business’ own internal user accounts. PAM solutions also differ in a drastic way from CIAM solutions by dealing with access to critical systems (e.g., databases, servers, domains, and networks) as well as handling IT admin accounts.

Key Benefits of Privileged Access Management Software

- Manage employee access privileges to key business systems
- Centralize storage of employee information
- Monitor employee behavior, web-based threats, and unapproved internal actors
- Customize access privileges for users
- Monitor employee account behavior

### Why Use Privileged Access Management Software?

There are many security benefits to PAM solutions. Older methods of key sharing and word-of-mouth communication are not sufficient in protecting information and business-critical systems. These tools will help security professionals and administrative personnel better track who in their organization has access to what and may document their actions or behaviors within privileged systems or applications.

**Security —** Privileged access management tools centralize the storage credentials and administration of access. Without IAM tools, this data can be more vulnerable to threats if it is not properly safeguarded. IAM tools are fortified with authentication features to limit viewing to only those administrators with granted access. These tools will also provide alerts for potential threats or users who have accessed sensitive data without permission.

**Administration —** Administrators can create databases, document user account histories, and view approved privileges, all of which helps to simplify the onboarding process. Administrators can quickly create new accounts and approve applications for new users to access. Some products even offer templates to have ready when adding employees to specific roles. The same goes for those no longer employed; administrators can quickly restrict their privileges or delete their account.

**Cloud application management —** Many cloud applications have the ability to connect dozens of applications, user credentials, and access privileges. Large, enterprise-sized companies will benefit greatly from having a cloud-based database that securely contains this sensitive data. Many products come with prebuilt integrations for hundreds of applications, while others may require customization or simply offer a limited variety of applications.

### Who Uses Privileged Access Management Software?

**Administrative professionals —** Administrators—typically security administrators—will most often be the ones using privileged access management solutions. Other system admins may find use in PAM solutions as well, since certain roles may need more or less access to different business systems, pending their role.

**Service providers —** Third-party service providers will often manage cloud services directly and may need to integrate with other business systems or networks. Privileged access management tools allow for role-based access control to limit what information and systems can be accessed by third-party services providers or other external entities requiring access to sensitive information or business-critical systems.

**Human resources —** HR professionals may use privileged access management solutions to delegate access to internal employees or new hires during the onboarding process. Many PAM tools integrate with directory services and identity servers and other identity management solutions to integrate identity information and simplify privileged account management. These accounts may be set up for access to applications, cloud services, databases, or any other IT system requiring privileged access.

**Internal employees —** These are the end users accessing applications and networks by the allowance of administrative or security staff. These individuals may only interact with the PAM solution in that they use the credentials to access information. But some tools may provide a dashboard or access portal with information about what applications, networks, services, and databases they have been approved to access.

### Privileged Access Management Software Features

These are a few common features of privileged access management software.

**Local access —** Local access functionality facilitates administrative access to on-premises systems, legacy applications, web-based applications, network resources, and servers.

**Multi-factor authentication (MFA) —** MFA or 2FA functionality adds a supplementary level of security for systems by requiring SMS codes, security questions, or other verification methods before granting access.

**Bulk changes —** Bulk change functionality can simplify the administration, federation, and identity governance of individuals in large amounts through batch update capabilities.

**Self-service access requests —** Self-service features allow users to request access to applications, networks, or databases, automatically provisioning individuals if they meet policy requirements.

**Partner access —** Local access functionality facilitates administrative access to users who are not company employees but are either within the company’s local area network or outside the network.

**BYOD support —** Bring-your-own-device (BYOD) features enable users to use their own device(s) to access company applications.

**Bidirectional profile synchronization —** Synchronization keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application.

**Policy management —** This feature enables administrators to create access requirements and standards while applying policy controls throughout request and provisioning processes.

**Role management —** Role management features help administrators establish roles that provide authentication and access rights for each user in the role.

**Approval workflows —** Process and approval workflows allow business stakeholders and administrators to approve or reject requested changes to access via a defined workflow.

**Compliance audits —** Auditing features allow for standards and policies to be established while proactively auditing access rights against predefined requirements.

**Smart provisioning —** Self-learning or automated provisioning helps to reduce the amount of manual work associated with creating access rights, as well as managing changes and removals for on-premises and cloud-based applications.

### Trends Related to Privileged Access Management Software

**Zero trust security —** [Zero trust networking](https://www.g2.com/categories/zero-trust-networking) is a method of network security and identity management which goes against traditional network security processes. Instead of allowing access to users who provide the proper credentials, access is always restricted to anyone accessing the network unless they have been thoroughly verified. This means individuals who work within the network may be prompted for verification multiple times, depending on their location, behaviors, or hardware devices.

The network perimeter is outlined while every individual working within it is analyzed on a number of levels. These variables typically include historical behaviors, locations, devices, and privileges. Those documented factors or actions are compared against the current behavior, location, and individual using the network. If risk surpasses a designated threshold, network access is cut off until the individual validates their identity and does not violate permissions or standards set by the administrators.

**Compliance —** Privacy regulations and international compliance requirements and standards are becoming more common across every industry. The most well known of which is the European Union’s General Data Protection Regulation (GDPR). Compliance audit functionality is an increasingly standard feature for PAM tools as a result of new regulations. These standards require companies to abide by a number of security standards in order to ensure sensitive information of customers and visitors remains protected from public visibility and access.

These regulations have forced businesses to adapt by changing their existing data management, storage, and governance processes. This continued trend has impacted the identity management world as much as any other industry because of the amount of sensitive information stored in identity management systems and the role identity management plays in granting individuals access to sensitive information.

### Potential Issues with Privileged Access Management Software

**Security —** Security is always a concern, especially with technologies specialized in protecting sensitive information. Individuals should be sure the administration of PAM software is controlled only by trusted individuals. Integrations with cloud services should be secure, and businesses should read the fine print on service provider contracts to ensure their security standards are sufficient. Without proper security protocols in place, systems may be vulnerable to data breaches, privilege escalation, and dozens of other web-based threats from both internal and external actors.

**Compliance requirements —** New compliance requirements are emerging across the globe. As this occurs, it’s important to remain adaptable in planning to secure, store, and deliver sensitive information in compliance with international regulations. Compliance management features will help to audit identity stores and servers to ensure each person is properly documented and their sensitive data is stored securely. Compliance auditing tools are also great add-ons for ad-hoc compliance checks and can be helpful in general to ensure a well-rounded security system is in place.

**Device compatibility —** End-user devices pose potential security risks if they are not compatible with identity management tools. They also pose a threat if they are not properly updated, patched, and protected in general. Device compatibility, support for servers, virtual environments and any other system requiring privileged access should be documented and integrated with systems to ensure every device is properly protected.




