Introducing G2.ai, the future of software buying.Try now
Alteryx
Sponsored
Alteryx
Visit Website
Product Avatar Image
Privileged Access Management

By RevBits Privileged Access Management

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Privileged Access Management and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Privileged Access Management?

Alteryx
Sponsored
Alteryx
Visit Website
It's been two months since this profile received a new review
Leave a Review

Privileged Access Management Reviews & Product Details

Product Avatar Image

Have you used Privileged Access Management before?

Answer a few questions to help the Privileged Access Management community

Privileged Access Management Reviews (1)

Reviews

Privileged Access Management Reviews (1)

5.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Yash S.
YS
Associate Programmer
Small-Business (50 or fewer emp.)
"Good System Administration"
What do you like best about Privileged Access Management?

It helps to manage and secure privileged credentials by enforcing strong password policies, regularly rotating passwords, and storing credentials in a secure and encrypted vault. Review collected by and hosted on G2.com.

What do you dislike about Privileged Access Management?

Managing a PAM system and the associated privileged accounts require dedicated administrative resources. Regular maintenance, policy updates, and user provisioning and deprovisioning can add to the administrative workload. Review collected by and hosted on G2.com.

There are not enough reviews of Privileged Access Management for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Salesforce Platform Logo
Salesforce Platform
4.5
(3,793)
Platform as a Service (PaaS) eliminates the expense and complexity of evaluating, buying, configuring, and managing all the hardware and software needed for custom-built applications.
2
JumpCloud Logo
JumpCloud
4.5
(3,739)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
3
Egnyte Logo
Egnyte
4.4
(1,108)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
4
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(793)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
5
BetterCloud Logo
BetterCloud
4.4
(477)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
6
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(390)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
7
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(369)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
8
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(194)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
9
Teleport Logo
Teleport
4.4
(107)
Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
10
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Privileged Access Management
View Alternatives