# Best Privileged Access Management (PAM) Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom&quot; by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access&quot; policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of _general_ user identities; PAM software, however, provides more granular control and visibility of _administrative or privileged user_ identities. While there is some similarity between the secure vaults within both [password managers](https://www.g2.com/categories/password-manager) and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

- Allow administrators to create and provision privileged access accounts
- Offer a secure vault to store privileged credentials or provision users with just-in-time access
- Monitor, record, and log user actions while using privileged accounts





## Category Overview

**Total Products under this Category:** 155


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 11,900+ Authentic Reviews
- 155+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Privileged Access Management (PAM) Software At A Glance

- **Leader:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
- **Highest Performer:** [Segura 360° Privilege Platform](https://www.g2.com/products/segura-360-privilege-platform/reviews)
- **Easiest to Use:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
- **Top Trending:** [Foxpass by Splashtop](https://www.g2.com/products/foxpass-by-splashtop/reviews)
- **Best Free Software:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)


---

**Sponsored**

### BeyondTrust Privileged Remote Access

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=paid_promo&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1252&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=15211&amp;secure%5Bresource_id%5D=1252&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fprivileged-access-management-pam&amp;secure%5Btoken%5D=4ea4a49ece6aa7d4b3adc07ca8f3cda14963893645699b5e45f7276bb7389c3f&amp;secure%5Burl%5D=https%3A%2F%2Fwww.beyondtrust.com%2Fproducts%2Fprivileged-remote-access&amp;secure%5Burl_type%5D=paid_promos&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,806

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.4/10 (Category avg: 8.8/10)
- **Audit log:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,482 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (881 reviews)
- Device Management (664 reviews)
- Security (519 reviews)
- Integrations (482 reviews)
- Features (431 reviews)

**Cons:**

- Missing Features (382 reviews)
- Improvement Needed (301 reviews)
- Limited Features (235 reviews)
- Limitations (177 reviews)
- Learning Curve (156 reviews)

### 2. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 864

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.8/10 (Category avg: 8.8/10)
- **Audit log:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 3. [AWS Secrets Manager](https://www.g2.com/products/aws-secrets-manager/reviews)
  AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.9/10 (Category avg: 8.8/10)
- **Audit log:** 7.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,225,864 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 56% Enterprise, 28% Mid-Market


### 4. [BeyondTrust Remote Support](https://www.g2.com/products/beyondtrust-remote-support/reviews)
  BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not. Service desks are provided with everything they need, end-to-end: centralized controls, remote access, automated scripts, encrypted file sharing, chat and collaboration for end-users and technicians, and live dashboards for KPIs and metric reporting. Organizations in all vertical markets around the globe use Remote Support to deliver superior support services and reduce threats to valuable data and systems. BeyondTrust is privately held and headquartered in Atlanta, GA with offices and channel partners around the world. Connect with BeyondTrust at www.beyondtrust.com, the BeyondTrust Blog, or on Facebook, Twitter and LinkedIn. Get a Free Trial: https://www.beyondtrust.com/remote-support/trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Remote Support: https://www.beyondtrust.com/products/remote-support


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 380

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 9.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 7.6/10 (Category avg: 8.8/10)
- **Audit log:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 47% Enterprise, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (26 reviews)
- Remote Access (18 reviews)
- Remote Support (15 reviews)
- Reliability (11 reviews)
- Security (11 reviews)

**Cons:**

- Expensive (10 reviews)
- Pricing Issues (8 reviews)
- Complexity (6 reviews)
- Learning Curve (6 reviews)
- Remote Access Issues (6 reviews)

### 5. [Segura 360° Privilege Platform](https://www.g2.com/products/segura-360-privilege-platform/reviews)
  Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, helping organizations protect and manage privileged identities across hybrid and cloud environments. Segura supports use cases like credential vaulting, session monitoring, least privilege enforcement, and secrets management for DevOps and cloud workloads. The company operates globally and, together with its network of partners, serves organizations across banking, telecom, government, and critical infrastructure sectors.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 73

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.4/10 (Category avg: 8.8/10)
- **Audit log:** 9.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Segura](https://www.g2.com/sellers/segura)
- **Year Founded:** 2010
- **HQ Location:** São Paulo, São Paulo
- **LinkedIn® Page:** https://www.linkedin.com/company/senhasegura/ (277 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Information Security Analyst
  - **Top Industries:** Telecommunications, Government Administration
  - **Company Size:** 68% Enterprise, 23% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Security (14 reviews)
- Customer Support (9 reviews)
- Access Management (8 reviews)
- Data Security (4 reviews)

**Cons:**

- Complex Coding (2 reviews)
- Limited Reporting (2 reviews)
- Poor Reporting (2 reviews)
- Setup Difficulty (2 reviews)
- Steep Learning Curve (2 reviews)

### 6. [Google Cloud Identity &amp; Access Management (IAM)](https://www.g2.com/products/google-cloud-identity-access-management-iam/reviews)
  Fine-grained access control and visibility for centrally managing cloud resources.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 57

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Reporting:** 9.7/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.7/10 (Category avg: 8.8/10)
- **Audit log:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,910,461 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (20 reviews)
- Security (16 reviews)
- Accessibility (12 reviews)
- Intuitive (12 reviews)
- Access Control (11 reviews)

**Cons:**

- Difficult Learning (10 reviews)
- Complexity (9 reviews)
- Complex Usage (7 reviews)
- Access Permissions (6 reviews)
- Access Control (5 reviews)

### 7. [SSH PrivX](https://www.g2.com/products/ssh-privx/reviews)
  PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threats become increasingly sophisticated, PrivX provides a scalable and cost-effective approach to safeguarding critical assets while ensuring compliance with various regulatory standards. Targeted primarily at IT administrators, security teams, and organizations operating within complex cloud infrastructures, PrivX is adaptable for businesses of all sizes. Its versatility allows for a range of use cases, including secure remote access for third-party vendors, management of cloud resource access, and facilitation of secure DevOps workflows. By streamlining privileged access management, PrivX effectively mitigates the risk of unauthorized access and potential data breaches, which are critical concerns for modern enterprises. PrivX boasts several core features that enhance its functionality. Automated password vaulting securely stores and manages credentials, ensuring that sensitive information is protected from unauthorized access. Additionally, the password rotation feature automatically updates passwords, maintaining strong security hygiene and significantly reducing the risks associated with credential theft. Another key aspect of PrivX is its passwordless authentication capability, which allows users to access systems securely without relying on traditional passwords, thereby minimizing the chances of falling victim to phishing attacks. A notable differentiator of PrivX is its quantum-safe connections, designed to protect data against the future risks posed by quantum computing. This forward-thinking feature ensures secure communications between users and systems, enhancing long-term security resilience. By incorporating such advanced security measures, PrivX not only addresses current security challenges but also prepares organizations for emerging threats. The combination of automation, scalability, and cutting-edge security features—such as quantum-safe encryption and passwordless access—positions PrivX as a compelling solution in the PAM landscape. By implementing PrivX, organizations can gain tighter control over privileged access, reduce administrative overhead, and improve compliance with regulatory requirements. This makes PrivX a practical and forward-looking choice for modern access management needs, enabling organizations to navigate the complexities of today’s digital landscape with confidence.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 51

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 7.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.6/10 (Category avg: 8.8/10)
- **Audit log:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [SSH Communications Security](https://www.g2.com/sellers/ssh-communications-security)
- **Company Website:** https://www.ssh.com
- **Year Founded:** 1995
- **HQ Location:** Helsinki, FI
- **Twitter:** @SSH (3,367 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10860 (527 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Cloud Operations Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 44% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (18 reviews)
- Security (16 reviews)
- Secure Access (13 reviews)
- Customer Support (9 reviews)
- Accessibility (8 reviews)

**Cons:**

- Integration Difficulty (12 reviews)
- Complex Setup (10 reviews)
- Limited OS Compatibility (4 reviews)
- Poor Documentation (4 reviews)
- Poor Reporting (4 reviews)

### 8. [BeyondTrust Password Safe](https://www.g2.com/products/beyondtrust-password-safe/reviews)
  BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and secrets. Password Safe drives automated credential and secrets management, real-time session management &amp; monitoring, and advanced auditing &amp; forensics capabilities – all while enabling zero trust. Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Password Safe: https://www.beyondtrust.com/products/password-safe


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 45

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.7/10 (Category avg: 8.8/10)
- **Audit log:** 8.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 54% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (11 reviews)
- Security (10 reviews)
- Auditing (9 reviews)
- Password Management (9 reviews)
- Secure Access (9 reviews)

**Cons:**

- Complex Setup (7 reviews)
- Expensive (3 reviews)
- Poor Reporting (3 reviews)
- Setup Difficulty (3 reviews)
- Steep Learning Curve (3 reviews)

### 9. [BeyondTrust Privileged Remote Access](https://www.g2.com/products/beyondtrust-privileged-remote-access/reviews)
  Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 58

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 9.0/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.0/10 (Category avg: 8.8/10)
- **Audit log:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 53% Mid-Market, 39% Enterprise


#### Pros & Cons

**Pros:**

- Secure Access (8 reviews)
- Security (8 reviews)
- Remote Access (7 reviews)
- Access Control (5 reviews)
- Accessibility (5 reviews)

**Cons:**

- Access Control (2 reviews)
- Lack of Features (2 reviews)
- Poor Navigation (2 reviews)
- Poor Reporting (2 reviews)
- Steep Learning Curve (2 reviews)

### 10. [StrongDM](https://www.g2.com/products/strongdm/reviews)
  StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infrastructure. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 102

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Reporting:** 7.8/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.2/10 (Category avg: 8.8/10)
- **Audit log:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [strongDM](https://www.g2.com/sellers/strongdm)
- **Company Website:** https://strongdm.com
- **Year Founded:** 2015
- **HQ Location:** Burlingame, California
- **Twitter:** @strongdm (887 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/strongdm/ (183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 74% Mid-Market, 15% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (14 reviews)
- Customer Support (8 reviews)
- Easy Management (6 reviews)
- Intuitive (6 reviews)
- Setup Ease (6 reviews)

**Cons:**

- Complex Setup (3 reviews)
- Implementation Difficulty (3 reviews)
- Lack of Features (3 reviews)
- UX Improvement (3 reviews)
- Customization Difficulties (2 reviews)

### 11. [Agentforce 360 Platform (formerly Salesforce Platform)](https://www.g2.com/products/agentforce-360-platform-formerly-salesforce-platform/reviews)
  Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can execute on your Customer 360 vision, securely, and keep your customer at the center of everything you do. Access a harmonized, unified view of your customers, automate manual, inefficient processes to drive productivity, and empower your employees to deliver a seamless, connected customer experience. Accelerate your Salesforce development, increase developer efficiency, and save on IT costs with the Salesforce platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,768

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Approval Workflows:** 10.0/10 (Category avg: 8.8/10)
- **Audit log:** 10.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Salesforce](https://www.g2.com/sellers/salesforce)
- **Company Website:** https://www.salesforce.com/
- **Year Founded:** 1999
- **HQ Location:** San Francisco, CA
- **Twitter:** @salesforce (581,471 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3185/ (88,363 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Salesforce Developer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 45% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (1639 reviews)
- Features (799 reviews)
- Customization (674 reviews)
- Customizability (670 reviews)
- Customization Options (630 reviews)

**Cons:**

- Learning Curve (574 reviews)
- Complexity (539 reviews)
- Expensive (485 reviews)
- Difficult Learning (413 reviews)
- Missing Features (412 reviews)

### 12. [BeyondTrust Endpoint Privilege Management](https://www.g2.com/products/beyondtrust-endpoint-privilege-management/reviews)
  BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance reporting for all endpoints. With best-in-class capabilities across Windows, macOS, Unix, and Linux, EPM supports the zero-trust journey by addressing key principles such as least privilege and zero standing privilege. BeyondTrust EPM enables IT and security teams to elevate application permissions without granting full admin rights, minimizing risk while maintaining productivity. Detailed audit logs help businesses easily meet cyber-insurance requirements while improving visibility and the ability to efficiently manage multi-platform infrastructures. As part of the BeyondTrust platform, EPM integrates seamlessly with a full range of security solutions to protect identities, stop threats, and ensure secure, dynamic access across diverse IT environments. Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Endpoint Privilege Management: https://www.beyondtrust.com/products/endpoint-privilege-management


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.5/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [BeyondTrust](https://www.g2.com/sellers/beyondtrust)
- **Company Website:** https://www.beyondtrust.com
- **Year Founded:** 1985
- **HQ Location:** Johns Creek, GA
- **Twitter:** @BeyondTrust (14,354 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/294396/ (1,682 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 52% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (4 reviews)
- Accessibility (3 reviews)
- Auditing (3 reviews)
- Policy Management (3 reviews)
- Security (3 reviews)

**Cons:**

- Setup Difficulty (2 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)
- Implementation Difficulty (1 reviews)
- Integration Difficulty (1 reviews)

### 13. [ManageEngine Password Manager Pro](https://www.g2.com/products/manageengine-password-manager-pro/reviews)
  Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account management, remote access management, privileged session management, and SSL certificate management. Password Manager Pro basically consolidates all your privileged accounts in a centralized vault in fully encrypted form. It enforces password management best practices and secures the privileged accounts, the keys to your kingdom. It helps mitigate security risks related to privileged access and preempt security breaches and compliance issues. Privileged Account Management: Adopt a best practice approach for effective management of privileged accounts that form the security perimeter around mission-critical data servers and other IT assets in your environment—whether they use password or key-based authentication, including those of operating systems, databases, servers, applications, cloud platforms, and networking devices. Remote Access Management: Establish centralized control on access pathways and define how users connect to target systems. Ensure ultimate security in all privileged connections with one-click login capabilities instead of sharing credentials in cleartext. Tunnel connections through an encrypted channel gateway, requiring no direct connectivity between the user device and remote host. Privileged Session Management: Stay aware of what your users are doing with their privileged access and prevent misuse. Facilitate advanced monitoring to check whether users—employees and third parties alike, stay within their provisioned scope. Readily answer questions regarding the ‘who’, ‘what’ and ‘when’ of privileged access. SSL Certificate Management: Gain complete visibility and control over your SSL environment. Stay away from risks of certificate expiration oversights, obsolete hashing algorithms and weak cipher suites that cost you your customers’ trust. Experience seamless, end-to-end management of certificate life cycles.


  **Average Rating:** 3.9/5.0
  **Total Reviews:** 35

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 6.7/10 (Category avg: 8.8/10)
- **Audit log:** 6.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,251 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Reviewer Demographics:**
  - **Company Size:** 43% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Deployment Ease (1 reviews)
- Easy Integrations (1 reviews)
- Efficiency (1 reviews)
- Implementation Ease (1 reviews)
- Monitoring (1 reviews)


### 14. [CyberArk Conjur](https://www.g2.com/products/cyberark-conjur/reviews)
  For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Reporting:** 9.4/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.0/10 (Category avg: 8.8/10)
- **Audit log:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,749 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (5,022 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 59% Enterprise, 29% Mid-Market


### 15. [Sonrai Security](https://www.g2.com/products/sonrai-security/reviews)
  Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and privilege security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. Trusted by Cloud Operations, Development, and Security Teams at leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. Sonrai’s Cloud Permissions Firewall, the leading cloud PAM solution, gets cloud access under control, slashes the privileged attack surface, and automates least privilege all without impeding DevOps. The Cloud Permissions Firewall uses privileged permission intelligence and usage monitoring to determine who needs what permissions in your cloud. Then, with one-click, it eliminates all unused sensitive privileges across your entire multi-cloud estate. Just-in-time access and exceptions are granted to roles on the fly as new needs come up so development goes uninterrupted. SecOps teams spend 97% less time achieving least privilege and slash the attack surface by 92%.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 26

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Sonrai Security](https://www.g2.com/sellers/sonrai-security)
- **Year Founded:** 2017
- **HQ Location:** New York, US
- **LinkedIn® Page:** https://www.linkedin.com/company/sonrai-security (64 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 42% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Cloud Security (12 reviews)
- Security (12 reviews)
- Cloud Management (10 reviews)
- Ease of Use (9 reviews)
- Cloud Technology (8 reviews)

**Cons:**

- Complexity (3 reviews)
- Expensive (3 reviews)
- Feature Limitations (3 reviews)
- Improvement Needed (3 reviews)
- Limited Customization (3 reviews)

### 16. [Akeyless Identity Security Platform](https://www.g2.com/products/akeyless-identity-security-platform/reviews)
  Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers AI-powered identity intelligence to surface risky access and strengthen oversight.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 86

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.5/10 (Category avg: 8.8/10)
- **Audit log:** 8.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Akeyless](https://www.g2.com/sellers/akeyless)
- **Company Website:** https://www.akeyless.io
- **Year Founded:** 2018
- **HQ Location:** Ramat Gan, Israel
- **Twitter:** @akeylessio (285 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/akeyless/ (103 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 51% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Security (10 reviews)
- Customer Support (9 reviews)
- Easy Integrations (4 reviews)
- Implementation Ease (4 reviews)

**Cons:**

- Poor Documentation (3 reviews)
- Poor UI (3 reviews)
- Complex Setup (2 reviews)
- Complex Usage (2 reviews)
- Dependency Issues (2 reviews)

### 17. [CyberArk Privileged Access Manager](https://www.g2.com/products/cyberark-privileged-access-manager/reviews)
  CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets. CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats. CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well. Customers have 350+ OOTB software integrations available in the CyberArk Marketplace, with over 235 technology vendors, ranging from security technologies, cloud service providers, IoT, OT, and web applications.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 66

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.8/10 (Category avg: 8.8/10)
- **Audit log:** 9.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,749 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (5,022 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Banking
  - **Company Size:** 89% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Security (6 reviews)
- Ease of Use (5 reviews)
- Reliability (4 reviews)
- Connectivity (3 reviews)
- Easy Access (3 reviews)

**Cons:**

- Difficult Setup (3 reviews)
- Integration Difficulty (3 reviews)
- Connectivity Issues (2 reviews)
- Integration Issues (2 reviews)
- Lack of Features (2 reviews)

### 18. [Doppler secrets management platform](https://www.g2.com/products/doppler-secrets-management-platform/reviews)
  Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significant risks, inefficiencies, and operational headaches. Doppler tackles these issues by consolidating secret management into a single, secure platform, ensuring reliability and consistency across teams and environments. Doppler’s mission reflects its core value: replacing disorganized, high-risk workflows with a unified, reliable system. With Doppler, teams can better manage their secrets while fostering security and operational stability. Managing secrets across diverse systems can often feel overwhelming. Doppler eliminates this complexity by organizing and securing sensitive data in one place. Its unified interface allows teams to maintain control over their secrets, enforce security best practices, and reduce the likelihood of misconfigurations or breaches. Doppler provides a structured and dependable solution to secrets management by addressing key challenges like: - Manual secret rotations - Synchronization issues - Compliance tracking Integration with popular tools and workflows is central to Doppler’s design. This ensures compatibility without disrupting established processes. This reduces operational bottlenecks, helping teams maintain productivity and focus on deploying critical applications. Connect with tools like: - Kubernetes - Terraform - CI/CD pipelines Its built-in logging and audit trails reduce the burden of manual compliance tasks, allowing teams to focus on strategic initiatives rather than administrative overhead. The platform also enhances visibility by providing insights into secret usage and access, ensuring that no detail is overlooked. For organizations concerned with compliance, Doppler simplifies the process of meeting industry standards such as: - SOC 2 - HIPAA - GDPR - ISO Doppler delivers a dependable way to centralize and safeguard secrets, reducing the risk of operational disruptions while maintaining compliance. Whether managing daily operations or scaling infrastructure, Doppler ensures your organization is prepared to handle the challenges of modern development environments. By bringing security, organization, and clarity to secret management, Doppler empowers teams to focus on what truly matters—driving innovation and delivering impactful results.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 64

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 7.2/10 (Category avg: 8.8/10)
- **Audit log:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Doppler](https://www.g2.com/sellers/doppler)
- **Company Website:** https://www.doppler.com/
- **Year Founded:** 2018
- **HQ Location:** San Francisco, California
- **Twitter:** @doppler (1,574 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/dopplerhq/ (43 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 77% Small-Business, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Easy Integrations (4 reviews)
- Integrations (4 reviews)
- Tools (3 reviews)
- Security (2 reviews)

**Cons:**

- Complex Setup (3 reviews)
- Expensive (2 reviews)
- Limited OS Compatibility (1 reviews)
- Setup Difficulty (1 reviews)

### 19. [Silverfort](https://www.g2.com/products/silverfort/reviews)
  Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 1.7/10 (Category avg: 8.8/10)
- **Audit log:** 5.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Silverfort](https://www.g2.com/sellers/silverfort)
- **Year Founded:** 2016
- **HQ Location:** Tel Aviv, Israel
- **Twitter:** @silverfort (653 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10681356/ (584 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 44% Small-Business, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (4 reviews)
- Ease of Use (2 reviews)
- MFA Security (2 reviews)
- Setup Ease (2 reviews)
- Time-Saving (2 reviews)

**Cons:**

- Poor Customer Support (2 reviews)
- Account Management (1 reviews)
- Complexity (1 reviews)
- Difficulty Locating (1 reviews)
- Implementation Difficulty (1 reviews)

### 20. [Syteca](https://www.g2.com/products/syteca/reviews)
  Syteca - control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle - account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Licensing is modular - you select and pay for the capabilities you actually need. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 22

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Reporting:** 9.4/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.0/10 (Category avg: 8.8/10)
- **Audit log:** 9.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Syteca Inc.](https://www.g2.com/sellers/syteca-inc)
- **Company Website:** https://syteca.com
- **Year Founded:** 2013
- **HQ Location:** 24 Crescent Street Suite 403 Waltham, MA 02453, USA
- **LinkedIn® Page:** https://www.linkedin.com/company/ekran-system/ (82 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 57% Mid-Market, 39% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (4 reviews)
- Ease of Use (4 reviews)
- Real-time Monitoring (4 reviews)
- Setup Ease (4 reviews)
- Deployment Ease (3 reviews)

**Cons:**

- Limited Features (2 reviews)
- Alert Management (1 reviews)
- Compatibility Issues (1 reviews)
- Expensive (1 reviews)
- Inefficient Alerting (1 reviews)

### 21. [Symantec PAM](https://www.g2.com/products/symantec-pam/reviews)
  Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring and recording privileged user activity across virtual, cloud, and physical environments. The solution provides a privileged credential vault, session recording, threat analytics, host-based access control for mission-critical servers, and application-to-application password management to address non-human actors, such as applications, configuration files, and scripts.


  **Average Rating:** 3.6/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.5/10 (Category avg: 9.3/10)
- **Reporting:** 7.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 6.9/10 (Category avg: 8.8/10)
- **Audit log:** 7.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Access Control (1 reviews)
- Secure Access (1 reviews)

**Cons:**

- Complex Setup (1 reviews)
- Time Delays (1 reviews)

### 22. [ARCON | Privileged Access Management (PAM)](https://www.g2.com/products/arcon-privileged-access-management-pam/reviews)
  ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization&#39;s IT infrastructure. By implementing ARCON | PAM, enterprises can effectively mitigate risks associated with unauthorized access, insider threats, and compliance violations. The solution offers a scalable architecture, making it suitable for diverse industries such as banking, healthcare, and government agencies. Key Features and Functionality: - Discovery &amp; Onboarding: Automatically discover and onboard privileged accounts from platforms like Microsoft Active Directory, AWS, Azure, and GCP. This process helps identify and manage orphaned accounts, ensuring comprehensive oversight of all privileged identities. - Multi-Factor Authentication (MFA): Enhance security by enforcing MFA, integrating seamlessly with tools such as Google Authenticator, Microsoft Authenticator, hardware tokens, facial recognition, and biometric authentication. - Single Sign-On (SSO): Simplify access by enabling secure, one-time authentication to multiple applications, supporting protocols like OAuth2.0, OpenID Connect (OIDC), and SAML. - Access Control: Implement the principle of least privilege by granting access based on specific roles and responsibilities, reducing the risk of unauthorized access and data breaches. - Credential Management: Securely manage and protect credentials, SSH keys, and secrets through vaulting, randomization, and retrieval mechanisms, safeguarding critical systems from unauthorized access. - Session Management: Monitor, record, and, if necessary, terminate privileged sessions in real-time, ensuring authorized operations and maintaining audit trails for compliance purposes. Primary Value and Problem Solved: ARCON | PAM addresses the critical need for robust privileged access security by providing organizations with the tools to manage, monitor, and control privileged accounts effectively. By implementing this solution, enterprises can: - Enhance Security: Protect sensitive systems and data from unauthorized access and potential breaches. - Ensure Compliance: Meet regulatory requirements such as PCI-DSS, HIPAA, and GDPR by enforcing stringent access controls and maintaining comprehensive audit trails. - Improve Operational Efficiency: Streamline access management processes, reduce administrative overhead, and facilitate secure remote access, thereby enhancing overall IT efficiency. Trusted by over 1,200 global organizations, ARCON | PAM is recognized for its swift integrations, lower total cost of ownership, and world-class IT support, making it a preferred choice for enterprises seeking to fortify their privileged access management framework.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 7.1/10 (Category avg: 8.8/10)
- **Approval Workflows:** 8.3/10 (Category avg: 8.8/10)
- **Audit log:** 7.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Arcon](https://www.g2.com/sellers/arcon)
- **Year Founded:** 2006
- **HQ Location:** Mumbai, Maharashtra
- **Twitter:** @ARCONRiskCtrl (1,099 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2403098/ (860 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Consultant
  - **Top Industries:** Information Technology and Services, Insurance
  - **Company Size:** 56% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Accessibility (1 reviews)
- Centralized Management (1 reviews)
- Flexibility (1 reviews)
- Password Management (1 reviews)
- Secure Access (1 reviews)

**Cons:**

- Documentation (1 reviews)
- Integration Difficulty (1 reviews)
- Limited OS Compatibility (1 reviews)
- Poor Documentation (1 reviews)
- Steep Learning Curve (1 reviews)

### 23. [Ping Identity](https://www.g2.com/products/ping-identity/reviews)
  Ping Identity is a type of identity management solution designed to help organizations implement Zero Trust security frameworks while enhancing user experiences across various platforms. With a focus on intelligent identity solutions, Ping Identity empowers enterprises to securely manage access to cloud, mobile, Software as a Service (SaaS), and on-premises applications, facilitating a seamless integration of identity management into their digital business strategies. The target audience for Ping Identity primarily includes large enterprises and organizations that require robust security measures and streamlined access management for their workforce, customers, and partners. This solution is particularly beneficial for businesses operating in hybrid environments, where applications and data are spread across multiple platforms and locations. By adopting Ping Identity, organizations can ensure that their security protocols are not only effective but also user-friendly, thereby improving overall productivity and satisfaction. Key features of the PingOne Cloud Platform include single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication, which collectively enhance security while simplifying the user experience. The platform&#39;s SSO capability allows users to access multiple applications with a single set of credentials, reducing password fatigue and improving user compliance. MFA adds an extra layer of security by requiring additional verification steps, which is crucial in today’s threat landscape. Adaptive authentication further strengthens security by assessing user behavior and context, enabling organizations to respond dynamically to potential risks. Ping Identity stands out in the identity management category through its commitment to open standards and strategic partnerships with industry leaders such as Microsoft and Amazon. This approach not only enhances interoperability with existing systems but also ensures that organizations can leverage the latest technologies and innovations in identity management. By providing flexible solutions tailored to meet the unique needs of each enterprise, Ping Identity accelerates digital transformation initiatives, enhances customer engagement, and fortifies security measures, making it a valuable asset for any organization looking to navigate the complexities of modern identity management.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 106

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.2/10 (Category avg: 8.8/10)
- **Audit log:** 8.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Company Website:** https://www.PingIdentity.com
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 68% Enterprise, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Management (1 reviews)
- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Identity Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Complex Administration (1 reviews)
- Complex Setup (1 reviews)
- Confusing Interface (1 reviews)
- Confusing Options (1 reviews)

### 24. [CyberFOX AutoElevate](https://www.g2.com/products/cyberfox-autoelevate/reviews)
  CyberFOX AutoElevate is a privileged access management (PAM) solution built for MSPs, IT professionals, and security teams to help them secure administrative access across Windows and Mac environments while keeping users productive. It simplifies the process of removing local admin rights and gives teams centralized control over user privilege requests, rules automation, and remote access management. With AutoElevate, organizations can adopt a least privilege security model, improve response times for privilege requests, and reduce support burden related to local admin rights. The software works with existing tools and fits into broader security stacks to strengthen access control and reduce attack surface exposure. CyberFOX AutoElevate helps remove unnecessary admin rights from user accounts, reduce security risk, and make it easier to enforce least privilege principles. It supports daily IT operations while strengthening defenses against malware, credential misuse, and unauthorized software installs. \_\_\_\_\_ Start Your CyberFOX Free Trial Get full access to CyberFOX and see how easy it is to secure privileged access, passwords, and DNS activity. No credit card required. https://www.cyberfox.com/free-trial


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 9.3/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.8/10 (Category avg: 8.8/10)
- **Audit log:** 9.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CyberFOX](https://www.g2.com/sellers/cyberfox)
- **Company Website:** https://www.cyberfox.com/
- **Year Founded:** 2022
- **HQ Location:** Tampa, FL
- **Twitter:** @CyberFoxLLC (160 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyberfoxsolutionsllc/ (114 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 50% Small-Business, 50% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (4 reviews)
- Security (4 reviews)
- Automation (3 reviews)
- Secure Access (3 reviews)
- Centralized Management (2 reviews)

**Cons:**

- Steep Learning Curve (1 reviews)

### 25. [CloudEagle](https://www.g2.com/products/cloudeagle/reviews)
  CloudEagle.ai is an AI-driven SaaS Management, Identity Governance, and Security solution that provides enterprises with a centralized command hub to detect, protect, govern, and optimize their SaaS and AI application ecosystems. Driving continuous orchestration for your Identities, AI, and SaaS stack, CloudEagle.ai unifies data from IT, HR, Finance, and Security to expose shadow AI usage, over-provisioned privileges, dormant identities, and redundant licenses. With 500+ native integrations, organizations achieve complete visibility across both sanctioned and unsanctioned applications. Codeless, Slack-native workflows streamline onboarding, offboarding, access reviews, license harvesting, and contract renewals. Role-driven provisioning enforces least-privilege access on an ongoing basis, while automated license reclamation directly links identity governance to measurable cost savings.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 9.5/10 (Category avg: 8.8/10)
- **Approval Workflows:** 9.5/10 (Category avg: 8.8/10)
- **Audit log:** 9.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [CloudEagle](https://www.g2.com/sellers/cloudeagle)
- **Year Founded:** 2021
- **HQ Location:** Palo Alto, US
- **Twitter:** @cloudeagleai (148 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudeagle/ (75 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 42% Small-Business


#### Pros & Cons

**Pros:**

- Automation (23 reviews)
- Ease of Use (21 reviews)
- Time-Saving (18 reviews)
- Tracking (16 reviews)
- Features (14 reviews)

**Cons:**

- Difficult Learning (9 reviews)
- Complex Setup (7 reviews)
- Difficult Setup (6 reviews)
- Setup Difficulty (6 reviews)
- Learning Curve (5 reviews)



## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools)
- [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)
- [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)



---

## Buyer Guide

### What You Should Know About Privileged Access Management Software

### What is Privileged Access Management Software?

When managing user accounts, companies should set a clear divide between customer-generated accounts and internal ones. The benefit of doing this is twofold. First, customer accounts and internal users have vastly different needs and requirements for your business. Second, compartmentalization helps prevent cross-contamination. More simply, if something goes wrong in your customer account management system, it won’t affect your internal account management system or vice versa.

Thankfully, different management systems exist specifically to focus on customer account management and internal accounts. While [customer identity and access management (CIAM) software](http://g2.com/categories/customer-identity-and-access-management) is built for handling your business’ customer-facing accounts and account security, privileged access management (PAM) software focuses on managing and securing your business’ own internal user accounts. PAM solutions also differ in a drastic way from CIAM solutions by dealing with access to critical systems (e.g., databases, servers, domains, and networks) as well as handling IT admin accounts.

Key Benefits of Privileged Access Management Software

- Manage employee access privileges to key business systems
- Centralize storage of employee information
- Monitor employee behavior, web-based threats, and unapproved internal actors
- Customize access privileges for users
- Monitor employee account behavior

### Why Use Privileged Access Management Software?

There are many security benefits to PAM solutions. Older methods of key sharing and word-of-mouth communication are not sufficient in protecting information and business-critical systems. These tools will help security professionals and administrative personnel better track who in their organization has access to what and may document their actions or behaviors within privileged systems or applications.

**Security —** Privileged access management tools centralize the storage credentials and administration of access. Without IAM tools, this data can be more vulnerable to threats if it is not properly safeguarded. IAM tools are fortified with authentication features to limit viewing to only those administrators with granted access. These tools will also provide alerts for potential threats or users who have accessed sensitive data without permission.

**Administration —** Administrators can create databases, document user account histories, and view approved privileges, all of which helps to simplify the onboarding process. Administrators can quickly create new accounts and approve applications for new users to access. Some products even offer templates to have ready when adding employees to specific roles. The same goes for those no longer employed; administrators can quickly restrict their privileges or delete their account.

**Cloud application management —** Many cloud applications have the ability to connect dozens of applications, user credentials, and access privileges. Large, enterprise-sized companies will benefit greatly from having a cloud-based database that securely contains this sensitive data. Many products come with prebuilt integrations for hundreds of applications, while others may require customization or simply offer a limited variety of applications.

### Who Uses Privileged Access Management Software?

**Administrative professionals —** Administrators—typically security administrators—will most often be the ones using privileged access management solutions. Other system admins may find use in PAM solutions as well, since certain roles may need more or less access to different business systems, pending their role.

**Service providers —** Third-party service providers will often manage cloud services directly and may need to integrate with other business systems or networks. Privileged access management tools allow for role-based access control to limit what information and systems can be accessed by third-party services providers or other external entities requiring access to sensitive information or business-critical systems.

**Human resources —** HR professionals may use privileged access management solutions to delegate access to internal employees or new hires during the onboarding process. Many PAM tools integrate with directory services and identity servers and other identity management solutions to integrate identity information and simplify privileged account management. These accounts may be set up for access to applications, cloud services, databases, or any other IT system requiring privileged access.

**Internal employees —** These are the end users accessing applications and networks by the allowance of administrative or security staff. These individuals may only interact with the PAM solution in that they use the credentials to access information. But some tools may provide a dashboard or access portal with information about what applications, networks, services, and databases they have been approved to access.

### Privileged Access Management Software Features

These are a few common features of privileged access management software.

**Local access —** Local access functionality facilitates administrative access to on-premises systems, legacy applications, web-based applications, network resources, and servers.

**Multi-factor authentication (MFA) —** MFA or 2FA functionality adds a supplementary level of security for systems by requiring SMS codes, security questions, or other verification methods before granting access.

**Bulk changes —** Bulk change functionality can simplify the administration, federation, and identity governance of individuals in large amounts through batch update capabilities.

**Self-service access requests —** Self-service features allow users to request access to applications, networks, or databases, automatically provisioning individuals if they meet policy requirements.

**Partner access —** Local access functionality facilitates administrative access to users who are not company employees but are either within the company’s local area network or outside the network.

**BYOD support —** Bring-your-own-device (BYOD) features enable users to use their own device(s) to access company applications.

**Bidirectional profile synchronization —** Synchronization keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application.

**Policy management —** This feature enables administrators to create access requirements and standards while applying policy controls throughout request and provisioning processes.

**Role management —** Role management features help administrators establish roles that provide authentication and access rights for each user in the role.

**Approval workflows —** Process and approval workflows allow business stakeholders and administrators to approve or reject requested changes to access via a defined workflow.

**Compliance audits —** Auditing features allow for standards and policies to be established while proactively auditing access rights against predefined requirements.

**Smart provisioning —** Self-learning or automated provisioning helps to reduce the amount of manual work associated with creating access rights, as well as managing changes and removals for on-premises and cloud-based applications.

### Trends Related to Privileged Access Management Software

**Zero trust security —** [Zero trust networking](https://www.g2.com/categories/zero-trust-networking) is a method of network security and identity management which goes against traditional network security processes. Instead of allowing access to users who provide the proper credentials, access is always restricted to anyone accessing the network unless they have been thoroughly verified. This means individuals who work within the network may be prompted for verification multiple times, depending on their location, behaviors, or hardware devices.

The network perimeter is outlined while every individual working within it is analyzed on a number of levels. These variables typically include historical behaviors, locations, devices, and privileges. Those documented factors or actions are compared against the current behavior, location, and individual using the network. If risk surpasses a designated threshold, network access is cut off until the individual validates their identity and does not violate permissions or standards set by the administrators.

**Compliance —** Privacy regulations and international compliance requirements and standards are becoming more common across every industry. The most well known of which is the European Union’s General Data Protection Regulation (GDPR). Compliance audit functionality is an increasingly standard feature for PAM tools as a result of new regulations. These standards require companies to abide by a number of security standards in order to ensure sensitive information of customers and visitors remains protected from public visibility and access.

These regulations have forced businesses to adapt by changing their existing data management, storage, and governance processes. This continued trend has impacted the identity management world as much as any other industry because of the amount of sensitive information stored in identity management systems and the role identity management plays in granting individuals access to sensitive information.

### Potential Issues with Privileged Access Management Software

**Security —** Security is always a concern, especially with technologies specialized in protecting sensitive information. Individuals should be sure the administration of PAM software is controlled only by trusted individuals. Integrations with cloud services should be secure, and businesses should read the fine print on service provider contracts to ensure their security standards are sufficient. Without proper security protocols in place, systems may be vulnerable to data breaches, privilege escalation, and dozens of other web-based threats from both internal and external actors.

**Compliance requirements —** New compliance requirements are emerging across the globe. As this occurs, it’s important to remain adaptable in planning to secure, store, and deliver sensitive information in compliance with international regulations. Compliance management features will help to audit identity stores and servers to ensure each person is properly documented and their sensitive data is stored securely. Compliance auditing tools are also great add-ons for ad-hoc compliance checks and can be helpful in general to ensure a well-rounded security system is in place.

**Device compatibility —** End-user devices pose potential security risks if they are not compatible with identity management tools. They also pose a threat if they are not properly updated, patched, and protected in general. Device compatibility, support for servers, virtual environments and any other system requiring privileged access should be documented and integrated with systems to ensure every device is properly protected.




