Choose a language
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Broadcom
How would you rate your experience with Symantec PAM?
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Based on 10 Symantec PAM reviews.
Provides a single access point for users to access multiple cloud products without multiple logins.
BYOD support
Enables users to bring-your-own-device to access company applications.
Password Vault
Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
As reported in 10 Symantec PAM reviews.
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
Audit Logging
Provides audit logs for compliance reasons.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks.
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights.
Approval Workflows
Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications.
Self-Service Access Requests
Automatically allows access if users meet policy requirements.
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Reporting
Includes reporting functionality.