Introducing G2.ai, the future of software buying.Try now

Best Privileged Access Management (PAM) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts
Show More
Show Less

Featured Privileged Access Management (PAM) Software At A Glance

Free Plan Available:
P0 Security
Sponsored
Leader:
Easiest to Use:
Show LessShow More

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Privileged Access Management (PAM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
153 Listings in Privileged Access Management (PAM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sonrai Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    12
    Security
    12
    Cloud Management
    10
    Ease of Use
    9
    Cloud Technology
    8
    Cons
    Complexity
    3
    Expensive
    3
    Feature Limitations
    3
    Improvement Needed
    3
    Limited Customization
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonrai Security features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Sonrai Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
12
Security
12
Cloud Management
10
Ease of Use
9
Cloud Technology
8
Cons
Complexity
3
Expensive
3
Feature Limitations
3
Improvement Needed
3
Limited Customization
3
Sonrai Security features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(26)4.4 out of 5
14th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

    Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 81% Enterprise
    • 15% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingAccess features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.8
    8.7
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,229 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,223 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

Users
No information available
Industries
  • Accounting
Market Segment
  • 81% Enterprise
  • 15% Small-Business
PingAccess features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.8
8.7
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,229 Twitter followers
LinkedIn® Page
www.linkedin.com
2,223 employees on LinkedIn®
Phone
1.303.468.2900

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Password Manager Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Easy Integrations
    1
    Efficiency
    1
    Implementation Ease
    1
    Monitoring
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.8
    6.7
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    550 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
ManageEngine Password Manager Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Easy Integrations
1
Efficiency
1
Implementation Ease
1
Monitoring
1
Cons
This product has not yet received any negative sentiments.
ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.8
6.7
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,873 Twitter followers
LinkedIn® Page
www.linkedin.com
550 employees on LinkedIn®
(18)4.8 out of 5
10th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Silverfort Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Ease of Use
    2
    MFA Security
    2
    Setup Ease
    2
    Time-Saving
    2
    Cons
    Poor Customer Support
    2
    Account Management
    1
    Complexity
    1
    Difficulty Locating
    1
    Implementation Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    1.7
    Reporting
    Average: 8.8
    0.0
    No information available
    5.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    535 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 44% Small-Business
  • 39% Mid-Market
Silverfort Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Ease of Use
2
MFA Security
2
Setup Ease
2
Time-Saving
2
Cons
Poor Customer Support
2
Account Management
1
Complexity
1
Difficulty Locating
1
Implementation Difficulty
1
Silverfort features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
1.7
Reporting
Average: 8.8
0.0
No information available
5.0
Audit log
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
648 Twitter followers
LinkedIn® Page
www.linkedin.com
535 employees on LinkedIn®
(16)4.8 out of 5
7th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Admin By Request Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Customer Support
    3
    Easy Management
    3
    Easy Setup
    3
    Cross-Platform Compatibility
    2
    Cons
    Setup Difficulties
    2
    Admin Limitations
    1
    Authentication Issues
    1
    Compatibility Issues
    1
    Complex Administration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Admin By Request features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Reporting
    Average: 8.8
    9.9
    Approval Workflows
    Average: 8.7
    9.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Francisco, California
    Twitter
    @AdminByRequest
    2,392 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

Users
No information available
Industries
No information available
Market Segment
  • 44% Mid-Market
  • 38% Enterprise
Admin By Request Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Customer Support
3
Easy Management
3
Easy Setup
3
Cross-Platform Compatibility
2
Cons
Setup Difficulties
2
Admin Limitations
1
Authentication Issues
1
Compatibility Issues
1
Complex Administration
1
Admin By Request features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.5
Reporting
Average: 8.8
9.9
Approval Workflows
Average: 8.7
9.5
Audit log
Average: 8.7
Seller Details
HQ Location
San Francisco, California
Twitter
@AdminByRequest
2,392 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Remote Desktop Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Mobile Compatibility
    3
    Password Management
    3
    Remote Access
    3
    Cross-Platform
    2
    Customer Support
    2
    Cons
    Delay Issues
    1
    Integration Difficulty
    1
    Learning Curve
    1
    Pricing Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,234 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    212 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 40% Mid-Market
Devolutions Remote Desktop Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Mobile Compatibility
3
Password Management
3
Remote Access
3
Cross-Platform
2
Customer Support
2
Cons
Delay Issues
1
Integration Difficulty
1
Learning Curve
1
Pricing Issues
1
Slow Performance
1
Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
8.8
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,234 Twitter followers
LinkedIn® Page
www.linkedin.com
212 employees on LinkedIn®
(23)4.7 out of 5
4th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Features
    4
    Implementation Ease
    4
    Real-time Monitoring
    4
    Cons
    Insufficient Detail
    2
    Limited Features
    2
    Slow Performance
    2
    Alert Management
    1
    Compatibility Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.8
    9.0
    Approval Workflows
    Average: 8.7
    9.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    24 Crescent Street Suite 403 Waltham, MA 02453, USA
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 39% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Features
4
Implementation Ease
4
Real-time Monitoring
4
Cons
Insufficient Detail
2
Limited Features
2
Slow Performance
2
Alert Management
1
Compatibility Issues
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.8
9.0
Approval Workflows
Average: 8.7
9.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2013
HQ Location
24 Crescent Street Suite 403 Waltham, MA 02453, USA
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
(82)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akeyless Identity Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    9
    Security
    7
    Easy Integrations
    3
    Implementation Ease
    3
    Cons
    Authentication Issues
    2
    Learning Curve
    2
    Missing Features
    2
    Poor Customer Support
    2
    Poor UI
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.8
    8.5
    Approval Workflows
    Average: 8.7
    8.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 28% Mid-Market
Akeyless Identity Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
9
Security
7
Easy Integrations
3
Implementation Ease
3
Cons
Authentication Issues
2
Learning Curve
2
Missing Features
2
Poor Customer Support
2
Poor UI
2
Akeyless Identity Security Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.8
8.5
Approval Workflows
Average: 8.7
8.2
Audit log
Average: 8.7
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
280 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 64% Enterprise
    • 32% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Varonis is a data security platform that provides visibility into sensitive data and monitors user access.
    • Users like the platform's ability to detect unusual behavior quickly, automate threat detection, and provide clear insights for preventing potential risks, making data governance and compliance easier to manage.
    • Reviewers mentioned that the platform can feel complex at first, requires time to learn all its features, and the interface could be more intuitive, with some reporting needing extra customization to match specific business needs.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Data Protection
    18
    Detailed Analysis
    17
    Features
    17
    Visibility
    16
    Cons
    Complexity
    17
    Learning Curve
    10
    Learning Difficulty
    10
    Steep Learning Curve
    8
    Complex Configuration
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Reporting
    Average: 8.8
    7.5
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,357 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,779 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 64% Enterprise
  • 32% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Varonis is a data security platform that provides visibility into sensitive data and monitors user access.
  • Users like the platform's ability to detect unusual behavior quickly, automate threat detection, and provide clear insights for preventing potential risks, making data governance and compliance easier to manage.
  • Reviewers mentioned that the platform can feel complex at first, requires time to learn all its features, and the interface could be more intuitive, with some reporting needing extra customization to match specific business needs.
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Data Protection
18
Detailed Analysis
17
Features
17
Visibility
16
Cons
Complexity
17
Learning Curve
10
Learning Difficulty
10
Steep Learning Curve
8
Complex Configuration
7
Varonis Data Security Platform features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Reporting
Average: 8.8
7.5
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,357 Twitter followers
LinkedIn® Page
www.linkedin.com
2,779 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper’s patented PAM platform enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KeeperPAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Flexibility
    4
    Secure Access
    4
    Security
    4
    Access Control
    3
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Learning
    2
    Difficult Learning Process
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeeperPAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Reporting
    Average: 8.8
    7.3
    Approval Workflows
    Average: 8.7
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,990 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    688 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper’s patented PAM platform enables organizations to achieve complete visibility, security, control and reporting across every user on every device. KeeperPAM is cloud-based, enables zero-trust and

Users
No information available
Industries
No information available
Market Segment
  • 64% Mid-Market
  • 36% Enterprise
KeeperPAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Flexibility
4
Secure Access
4
Security
4
Access Control
3
Cons
Complexity
2
Complex Setup
2
Difficult Learning
2
Difficult Learning Process
2
Access Control
1
KeeperPAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.3
Reporting
Average: 8.8
7.3
Approval Workflows
Average: 8.7
8.8
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,990 Twitter followers
LinkedIn® Page
www.linkedin.com
688 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 80% Small-Business
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppler secrets management platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Integrations
    6
    Integrations
    5
    Tools
    3
    Security
    2
    Cons
    Expensive
    4
    Complex Setup
    3
    Limited Automation
    1
    Limited OS Compatibility
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.8
    7.2
    Approval Workflows
    Average: 8.7
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,469 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 80% Small-Business
  • 18% Mid-Market
Doppler secrets management platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Integrations
6
Integrations
5
Tools
3
Security
2
Cons
Expensive
4
Complex Setup
3
Limited Automation
1
Limited OS Compatibility
1
Setup Difficulty
1
Doppler secrets management platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.8
7.2
Approval Workflows
Average: 8.7
8.9
Audit log
Average: 8.7
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,469 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 90% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Connectivity
    2
    Integrations
    2
    Security
    2
    Solution Integration
    2
    Cons
    Integration Difficulty
    2
    Integration Issues
    2
    Poor Customer Support
    2
    Authentication Issues
    1
    Complex Hierarchy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,644 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 90% Enterprise
  • 34% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Connectivity
2
Integrations
2
Security
2
Solution Integration
2
Cons
Integration Difficulty
2
Integration Issues
2
Poor Customer Support
2
Authentication Issues
1
Complex Hierarchy
1
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.0
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,644 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.8
    9.2
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,229 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,223 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.8
9.2
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,229 Twitter followers
LinkedIn® Page
www.linkedin.com
2,223 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudEagle.ai is a leading AI-powered SaaS management and governance platform that helps IT, finance, security, and procurement teams manage, govern, and renew all SaaS apps from one place. It has pro

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CloudEagle is a platform that provides visibility into SaaS and AI apps usage, costs, and automates access reviews.
    • Reviewers frequently mention the platform's ability to uncover 'shadow IT' applications, automate onboarding and offboarding, and provide a single dashboard for tracking all SaaS spending and app usage.
    • Users reported initial setup confusion, a lack of integration with certain accounting tools like Tally, and a desire for more out-of-the-box integrations with mid-market SaaS vendors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudEagle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    22
    Time-Saving
    17
    Ease of Use
    16
    Tracking
    15
    Cloud Services
    12
    Cons
    Difficult Learning
    8
    Complex Setup
    6
    Setup Difficulty
    6
    Difficult Setup
    5
    Learning Curve
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudEagle features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Reporting
    Average: 8.8
    9.5
    Approval Workflows
    Average: 8.7
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Palo Alto, US
    Twitter
    @cloudeagleai
    149 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudEagle.ai is a leading AI-powered SaaS management and governance platform that helps IT, finance, security, and procurement teams manage, govern, and renew all SaaS apps from one place. It has pro

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CloudEagle is a platform that provides visibility into SaaS and AI apps usage, costs, and automates access reviews.
  • Reviewers frequently mention the platform's ability to uncover 'shadow IT' applications, automate onboarding and offboarding, and provide a single dashboard for tracking all SaaS spending and app usage.
  • Users reported initial setup confusion, a lack of integration with certain accounting tools like Tally, and a desire for more out-of-the-box integrations with mid-market SaaS vendors.
CloudEagle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
22
Time-Saving
17
Ease of Use
16
Tracking
15
Cloud Services
12
Cons
Difficult Learning
8
Complex Setup
6
Setup Difficulty
6
Difficult Setup
5
Learning Curve
4
CloudEagle features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
9.5
Reporting
Average: 8.8
9.5
Approval Workflows
Average: 8.7
9.4
Audit log
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Palo Alto, US
Twitter
@cloudeagleai
149 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
(41)4.8 out of 5
6th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastruc

    Users
    No information available
    Industries
    • Internet
    • Computer Software
    Market Segment
    • 66% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Foxpass by Splashtop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Implementation Ease
    3
    Performance Efficiency
    3
    Reliability
    3
    Setup Ease
    3
    Cons
    Expensive
    1
    Limited OS Compatibility
    1
    Poor Navigation
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Foxpass by Splashtop features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.8
    5.8
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2006
    HQ Location
    Cupertino, CA
    Twitter
    @splashtop
    5,233 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    335 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastruc

Users
No information available
Industries
  • Internet
  • Computer Software
Market Segment
  • 66% Mid-Market
  • 24% Small-Business
Foxpass by Splashtop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Implementation Ease
3
Performance Efficiency
3
Reliability
3
Setup Ease
3
Cons
Expensive
1
Limited OS Compatibility
1
Poor Navigation
1
UX Improvement
1
Foxpass by Splashtop features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.8
5.8
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2006
HQ Location
Cupertino, CA
Twitter
@splashtop
5,233 Twitter followers
LinkedIn® Page
www.linkedin.com
335 employees on LinkedIn®