2026 Best Software Awards are here!See the list

Best Enterprise Privileged Access Management (PAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Privileged Access Management (PAM) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Privileged Access Management (PAM) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Privileged Access Management (PAM) category.

In addition to qualifying for inclusion in the Privileged Access Management (PAM) Software category, to qualify for inclusion in the Enterprise Business Privileged Access Management (PAM) Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

19 Listings in Enterprise Privileged Access Management (PAM) Software Available

(891)4.5 out of 5
5th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Microsoft Entra ID
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    76
    Security
    69
    Identity Management
    53
    Single Sign-On
    48
    SSO (Single Sign-On)
    41
    Cons
    Expensive
    32
    Cost
    20
    Integration Issues
    18
    Missing Features
    17
    Complexity
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.8
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,091,027 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Mid-Market
  • 36% Enterprise
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
76
Security
69
Identity Management
53
Single Sign-On
48
SSO (Single Sign-On)
41
Cons
Expensive
32
Cost
20
Integration Issues
18
Missing Features
17
Complexity
15
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.8
9.1
Audit log
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,091,027 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
(3,935)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Privileged Access Management (PAM) software
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a tool that manages user access and authentication, unifying identity, access, and device management into a single, cloud-native platform.
    • Users frequently mention that JumpCloud simplifies IT operations by providing a single source of truth for users and devices, enabling strong security through SSO, MFA, and automated onboarding/offboarding.
    • Reviewers noted that the initial setup and policy configuration can be complex, especially for organizations migrating from traditional Active Directory or managing advanced security use cases.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    913
    Device Management
    712
    Integrations
    527
    Security
    527
    User Management
    456
    Cons
    Missing Features
    367
    Improvement Needed
    291
    Limited Features
    233
    Limitations
    162
    UX Improvement
    160
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Reporting
    Average: 8.8
    8.4
    Approval Workflows
    Average: 8.8
    8.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,567 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    959 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a tool that manages user access and authentication, unifying identity, access, and device management into a single, cloud-native platform.
  • Users frequently mention that JumpCloud simplifies IT operations by providing a single source of truth for users and devices, enabling strong security through SSO, MFA, and automated onboarding/offboarding.
  • Reviewers noted that the initial setup and policy configuration can be complex, especially for organizations migrating from traditional Active Directory or managing advanced security use cases.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
913
Device Management
712
Integrations
527
Security
527
User Management
456
Cons
Missing Features
367
Improvement Needed
291
Limited Features
233
Limitations
162
UX Improvement
160
JumpCloud features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.5
Reporting
Average: 8.8
8.4
Approval Workflows
Average: 8.8
8.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,567 Twitter followers
LinkedIn® Page
www.linkedin.com
959 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(74)4.8 out of 5
4th Easiest To Use in Privileged Access Management (PAM) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

    Users
    • Information Security Analyst
    Industries
    • Telecommunications
    • Government Administration
    Market Segment
    • 68% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Segura 360° Privilege Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Security
    21
    Customer Support
    12
    Access Management
    9
    Access Control
    5
    Cons
    Expensive
    3
    Steep Learning Curve
    3
    Complex Coding
    2
    Lack of Features
    2
    Limited Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    9.4
    Approval Workflows
    Average: 8.8
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Segura
    Year Founded
    2010
    HQ Location
    São Paulo, São Paulo
    LinkedIn® Page
    www.linkedin.com
    277 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

Users
  • Information Security Analyst
Industries
  • Telecommunications
  • Government Administration
Market Segment
  • 68% Enterprise
  • 23% Mid-Market
Segura 360° Privilege Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Security
21
Customer Support
12
Access Management
9
Access Control
5
Cons
Expensive
3
Steep Learning Curve
3
Complex Coding
2
Lack of Features
2
Limited Reporting
2
Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
9.4
Approval Workflows
Average: 8.8
9.4
Audit log
Average: 8.7
Seller Details
Seller
Segura
Year Founded
2010
HQ Location
São Paulo, São Paulo
LinkedIn® Page
www.linkedin.com
277 employees on LinkedIn®
(52)4.5 out of 5
Optimized for quick response
7th Easiest To Use in Privileged Access Management (PAM) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

    Users
    • Cloud Operations Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSH PrivX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Security
    16
    Secure Access
    12
    Customer Support
    9
    Accessibility
    8
    Cons
    Integration Difficulty
    12
    Complex Setup
    10
    Limited OS Compatibility
    4
    Poor Documentation
    4
    UX Improvement
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH PrivX features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.0
    Reporting
    Average: 8.8
    8.5
    Approval Workflows
    Average: 8.8
    8.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,382 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

Users
  • Cloud Operations Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Enterprise
  • 31% Mid-Market
SSH PrivX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Security
16
Secure Access
12
Customer Support
9
Accessibility
8
Cons
Integration Difficulty
12
Complex Setup
10
Limited OS Compatibility
4
Poor Documentation
4
UX Improvement
4
SSH PrivX features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.0
Reporting
Average: 8.8
8.5
Approval Workflows
Average: 8.8
8.4
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,382 Twitter followers
LinkedIn® Page
www.linkedin.com
528 employees on LinkedIn®
(376)4.7 out of 5
3rd Easiest To Use in Privileged Access Management (PAM) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 47% Enterprise
    • 35% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BeyondTrust Remote Support is a software that provides remote access and support capabilities, with features such as chat functionality, command line feature, file sharing, and cross-platform support.
    • Users frequently mention the software's strong security, ease of use, reliable remote access, and the ability to work together within a team, as well as the helpfulness of the support team.
    • Reviewers noted some issues such as an outdated interface, too many pop-up windows, occasional slow performance, and a high cost compared to other tools.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Remote Support Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Remote Access
    19
    Remote Support
    15
    Security
    11
    Security Focus
    11
    Cons
    Expensive
    10
    Pricing Issues
    7
    Remote Access Issues
    6
    Complexity
    5
    Connectivity Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Remote Support features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    9.1
    Reporting
    Average: 8.8
    7.6
    Approval Workflows
    Average: 8.8
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 47% Enterprise
  • 35% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BeyondTrust Remote Support is a software that provides remote access and support capabilities, with features such as chat functionality, command line feature, file sharing, and cross-platform support.
  • Users frequently mention the software's strong security, ease of use, reliable remote access, and the ability to work together within a team, as well as the helpfulness of the support team.
  • Reviewers noted some issues such as an outdated interface, too many pop-up windows, occasional slow performance, and a high cost compared to other tools.
BeyondTrust Remote Support Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Remote Access
19
Remote Support
15
Security
11
Security Focus
11
Cons
Expensive
10
Pricing Issues
7
Remote Access Issues
6
Complexity
5
Connectivity Issues
5
BeyondTrust Remote Support features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
9.1
Reporting
Average: 8.8
7.6
Approval Workflows
Average: 8.8
9.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,336 Twitter followers
LinkedIn® Page
www.linkedin.com
1,682 employees on LinkedIn®
(45)4.5 out of 5
14th Easiest To Use in Privileged Access Management (PAM) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Password Safe Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    10
    Auditing
    9
    Secure Access
    9
    Password Management
    8
    Cons
    Complex Setup
    7
    Expensive
    3
    Poor Reporting
    3
    Setup Difficulty
    3
    Steep Learning Curve
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Password Safe features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Reporting
    Average: 8.8
    8.7
    Approval Workflows
    Average: 8.8
    8.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
BeyondTrust Password Safe Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
10
Auditing
9
Secure Access
9
Password Management
8
Cons
Complex Setup
7
Expensive
3
Poor Reporting
3
Setup Difficulty
3
Steep Learning Curve
3
BeyondTrust Password Safe features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.5
Reporting
Average: 8.8
8.7
Approval Workflows
Average: 8.8
8.4
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,336 Twitter followers
LinkedIn® Page
www.linkedin.com
1,682 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Endpoint Privilege Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Accessibility
    3
    Auditing
    3
    Policy Management
    3
    Security
    3
    Cons
    Setup Difficulty
    2
    Difficult Learning
    1
    Expensive
    1
    Implementation Difficulty
    1
    Integration Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.8
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 42% Mid-Market
BeyondTrust Endpoint Privilege Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Accessibility
3
Auditing
3
Policy Management
3
Security
3
Cons
Setup Difficulty
2
Difficult Learning
1
Expensive
1
Implementation Difficulty
1
Integration Difficulty
1
BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.8
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,336 Twitter followers
LinkedIn® Page
www.linkedin.com
1,682 employees on LinkedIn®
(3,965)4.5 out of 5
Optimized for quick response
11th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Salesforce Platform
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 34% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Salesforce is a cloud-based platform designed for managing customer data, automating workflows, and creating custom user interfaces.
    • Users frequently mention the platform's high level of customization, its ability to integrate with other tools, and its robust reporting and dashboard capabilities as key benefits.
    • Users reported issues with the platform's complexity, particularly for new users, its high cost, especially for smaller teams, and occasional performance issues.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1,547
    Features
    747
    Customizability
    627
    Customization
    626
    Customization Options
    586
    Cons
    Learning Curve
    540
    Complexity
    495
    Expensive
    460
    Difficult Learning
    390
    Missing Features
    385
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.8
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    581,040 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 34% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Salesforce is a cloud-based platform designed for managing customer data, automating workflows, and creating custom user interfaces.
  • Users frequently mention the platform's high level of customization, its ability to integrate with other tools, and its robust reporting and dashboard capabilities as key benefits.
  • Users reported issues with the platform's complexity, particularly for new users, its high cost, especially for smaller teams, and occasional performance issues.
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1,547
Features
747
Customizability
627
Customization
626
Customization Options
586
Cons
Learning Curve
540
Complexity
495
Expensive
460
Difficult Learning
390
Missing Features
385
Salesforce Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.8
10.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
581,040 Twitter followers
LinkedIn® Page
www.linkedin.com
86,064 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.8
    9.2
    Approval Workflows
    Average: 8.8
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,177 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.8
9.2
Approval Workflows
Average: 8.8
8.3
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,177 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Remote Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Secure Access
    8
    Remote Access
    7
    Security
    7
    Ease of Use
    6
    Access Control
    5
    Cons
    Access Control
    2
    Poor Navigation
    2
    Poor Reporting
    2
    Steep Learning Curve
    2
    UX Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.8
    8.9
    Approval Workflows
    Average: 8.8
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,682 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Enterprise
BeyondTrust Privileged Remote Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Secure Access
8
Remote Access
7
Security
7
Ease of Use
6
Access Control
5
Cons
Access Control
2
Poor Navigation
2
Poor Reporting
2
Steep Learning Curve
2
UX Improvement
2
BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.8
8.9
Approval Workflows
Average: 8.8
8.9
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,336 Twitter followers
LinkedIn® Page
www.linkedin.com
1,682 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

    Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 81% Enterprise
    • 15% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingAccess features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Reporting
    Average: 8.8
    8.7
    Approval Workflows
    Average: 8.8
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,177 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,311 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

Users
No information available
Industries
  • Accounting
Market Segment
  • 81% Enterprise
  • 15% Small-Business
PingAccess features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.6
Reporting
Average: 8.8
8.7
Approval Workflows
Average: 8.8
8.5
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,177 Twitter followers
LinkedIn® Page
www.linkedin.com
2,311 employees on LinkedIn®
Phone
1.303.468.2900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 88% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    3
    Security
    3
    Automation
    2
    Connectivity
    2
    Ease of Use
    2
    Cons
    Connectivity Issues
    2
    Integration Difficulty
    2
    Integration Issues
    2
    Poor Customer Support
    2
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.1
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.8
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,718 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 88% Enterprise
  • 33% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
3
Security
3
Automation
2
Connectivity
2
Ease of Use
2
Cons
Connectivity Issues
2
Integration Difficulty
2
Integration Issues
2
Poor Customer Support
2
Authentication Issues
1
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.1
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.8
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,718 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Secret Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Password Management
    1
    Security
    1
    Cons
    Complex Usage
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Secret Server features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Reporting
    Average: 8.8
    8.2
    Approval Workflows
    Average: 8.8
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    871 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,232 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Mid-Market
  • 29% Enterprise
Delinea Secret Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Password Management
1
Security
1
Cons
Complex Usage
1
Setup Difficulty
1
Delinea Secret Server features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.8
Reporting
Average: 8.8
8.2
Approval Workflows
Average: 8.8
9.0
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
871 Twitter followers
LinkedIn® Page
www.linkedin.com
1,232 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization's IT infrastructure. By implementing ARCON | P

    Users
    • Consultant
    Industries
    • Information Technology and Services
    • Insurance
    Market Segment
    • 56% Mid-Market
    • 41% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    7.1
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.8
    7.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Arcon
    Year Founded
    2006
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @ARCONRiskCtrl
    1,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    858 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization's IT infrastructure. By implementing ARCON | P

Users
  • Consultant
Industries
  • Information Technology and Services
  • Insurance
Market Segment
  • 56% Mid-Market
  • 41% Enterprise
ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
7.1
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.8
7.4
Audit log
Average: 8.7
Seller Details
Seller
Arcon
Year Founded
2006
HQ Location
Mumbai, Maharashtra
Twitter
@ARCONRiskCtrl
1,101 Twitter followers
LinkedIn® Page
www.linkedin.com
858 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Remote Desktop Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Mobile Compatibility
    3
    Password Management
    3
    Remote Access
    3
    Cross-Platform
    2
    Customer Support
    2
    Cons
    Delay Issues
    1
    Integration Difficulty
    1
    Learning Curve
    1
    Pricing Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.8
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 41% Mid-Market
Devolutions Remote Desktop Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Mobile Compatibility
3
Password Management
3
Remote Access
3
Cross-Platform
2
Customer Support
2
Cons
Delay Issues
1
Integration Difficulty
1
Learning Curve
1
Pricing Issues
1
Slow Performance
1
Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.8
8.8
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,232 Twitter followers
LinkedIn® Page
www.linkedin.com
221 employees on LinkedIn®