Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Arcon

Show rating breakdown
39 reviews
  • 2 profiles
  • 2 categories
Average star rating
4.4
Serving customers since
2006

Profile Name

Star Rating

29
9
0
0
1

Arcon Reviews

Review Filters
Profile Name
Star Rating
29
9
0
0
1
Verified User in Computer Software
AC
Verified User in Computer Software
06/04/2025
Validated Reviewer
Review source: Organic

Reliable PAM solution that enhances compliance and reduces risk

Arcon provide a granual access control system that helps ensure only the right users access sensitive system at the right ime. I especially felt good with real time monitoring and session recording features, which offer visibility and auditing. The UI has improved significantly over the past year, making navigation and policy configuration easier.
Manjunath K.
MK
Manjunath K.
06/04/2025
Validated Reviewer
Review source: Organic
Verified User in Education Management
UE
Verified User in Education Management
08/22/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Protect your identity in the world of digital

With ARCON, we wanted to make sure that we have secure and permitted access to the server, database and overall infrastructure of the company and this proved to be the best solution at that point of time. With the increasing concept of Work From Anywhere (WFA), this turns out to be a blessing in disguise.

About

Contact

HQ Location:
Mumbai, Maharashtra

Social

@ARCONRiskCtrl

What is Arcon?

Arcon is a leading provider of information security solutions, specializing in Privileged Access Management (PAM) and risk management tools. With a focus on safeguarding digital environments, Arcon's solutions help organizations protect sensitive data by managing and monitoring privileged accounts, reducing risks associated with unauthorized access. The company offers a comprehensive suite of security products designed to enhance compliance, streamline operations, and ensure robust IT security. Arcon's solutions are utilized across various industries to secure critical infrastructure and data.

Details

Year Founded
2006