Privileged Access Management Reviews and Ratings

What are Privileged Access Management ?

Gartner defines privileged access management (PAM) as tools that administer or configure systems and applications to provide an elevated level of technical access through the management and protection of accounts, credentials and commands. PAM tools, available as software, SaaS or hardware appliances, manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: Privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management and cloud infrastructure entitlement management (CIEM) .

Products In Privileged Access Management Category

"Secret Server is a top tier secret management solution!"

This software has saved us so much time and effort in our automation of our secrets. We had troubles for years with making this software what it should be until someone took the time and care to develop and maintain the software to ensure that it worked for our environment. Once rearchitected with full rack and data center redundancy our next steps were to see how we could use the software to innovate and create better workflows for our environment. Secret Server did all that we wanted and more. We are still finding new features day in and day out that make our lives easier.

Read reviews

"CyberArk: Stopping security breaches from square one."

Cyberark is a truly next level secure login system which protects your users, servers, and assets. For those who don't know, Cyberark is a system to log into devices using a very secured two factor authentication, encryption, and logged system. It literally covers all potential security concerns for any user logging into a device. And it does a really good job of it by moving across to mediums: A securing application for your phone and through secured browser login.

Read reviews

"Indian Bank experience on PAM"

ARCON PAM plays a crucial role in addressing CISO (Chief Information Security Officer) concerns related to Identity management and secure server access within the organization. It strikes a balance between robust security features, useability and centralized management. Here are some of the overall product experience as follows OTP based authentication adds an additional layer of security and ensures that only authorized users have access to servers. Managing multiple servers conveniently from a single login. IP identification and domain names in the front end interface to quickly identify different servers. A simple User Interface is useful for efficient server management. Ability to monitor user activity through video and command logs which allows us to track super admins behavior. Real-time monitoring by providing visibility into on-going sessions. Multi-Admin approval adds an extra layer of security to ensure unauthorized access and responsible management. Integration with Vulnerability Assessment tool will flag identified security gaps and address at prompt. Simplifies all server access without the use of traditional authentication methods such as passwords.

Read reviews

"Robust MFA and SSO solution "

Best product and easy to access tool I have ever used in my entire IT career.

Read reviews

"Password Manager Pro is easy to use and really secure to store IT's passwords."

The deploy of password manager pro included an olistic project, because we included trainning, idea storm, prove of oncept before to the technical projetc. On this previous stages a Manage Engine Partner help us with these activities. For us was really import write security policies join to IT. In our case, the first user of password manager pro are human resources of IT.

Read reviews

"BeyondTrust Remote Support. 10/10 from someone who uses it every day."

As an IT Support Manager we moved from another product to Beyond Trust for our IT support last year and it has been a game changer. Fantastic onboarding and setup assistance and the product has made us able to login to remote users' machines so much easier than before.

Read reviews

"BeyondTrust Privileged Remote Access get the job done from anywhere."

BeyondTrust Privileged Remote Access is good for managing vendors who needs remote access to your environment.

Read reviews

"The best experience in PAM solution."

senhasegura, unlike other solutions I have worked with, has a very intuitive and simple interface to operate on a daily basis, making the process of adding new credentials an fixing problems faster and more assertive. What impresses me most about the solution is how easy it to create and configure new connctions to servers, whatever they may be. I also need to emphasize here the nimbleness in the support provided by Projects' and Support's team whenever we contacted them, which means that we always have an exceptional SLA service.

Read reviews

"A fantastic Remote Desktop Manager!"

I absolutely adore Remote Desktop Manager. In my day-to-day work, I'm often switching between multiple RDP sessions, sometimes with multiple sessions open at the same time. Without fail, Remote Desktop Manager has handled everything I've thrown at it. When your job role is dependent on being able to access customer environments quickly, having a reliable Remote Desktop Manager is essential, and that's exactly how I would describe Devolution's RDM. My personal use case is pretty simple (managing RDP sessions), but they have an incredible amount of additional functionality that can be used to highly secure your sessions, share RDPs, and import/export (among a lot more functionality). Overall, I highly suggest this software.

Read reviews

"Transitioning from Admin to Regular Access with Ease"

We were looking for a product that would help us transition our Windows User community from full admin access to regular user access without any major disruptions to our user community. This product did exactly that. We were able to install the product onto all of our Workstations and then slowly ratchet up the restrictions with very few user issues.

Read reviews

"Navigating Security Compliance with Intuitive Web Interface"

Equip administrators and power users with the ability to perform privileged tasks while ensuring those rights remain secure and accessible only for the timeframe required.

Read reviews

"The essential PAM solution for growing enterprises "

We found Sectona PAM to be the perfect tool for securing privileged access across our servers and applications. One standout feature is its user-friendly interface, improving our security posture significantly. The logging and session recording capabilities have proven invaluable for compliance audits, knowing that we can easily retreive needed data.

Read reviews

"Excellent product, easy to deploy and operate at reasonable cost."

Very good product, complete feature set, very flexible deployment (on premises or Cloud) and licensing options (per user, per end-device,...), and good price. Regarding services, Wallix provides the option to deploy the solution using one of its certified systems integrators or using directly Wallix engineering services.

Read reviews

"Best PAM Solution Across the Security Solution Industry "

The solutions meets our complete requirements & we are more than happy to see few of the advanced features with the solution.

Read reviews

"Good EPM tool for managing admin accounts"

The good tool for managing and controlling users local admin accounts. Also when user need to priv escalation for run specific app, this time send notification to admin and we can see it on the main dashboard.

Read reviews

"One identity safeguard, a product you should try."

The vendor showed competence and knowledge of the solution, fixed and supported the customer to satisfaction.

Read reviews

"Decoding the Implementation Ease of CyberArk and Conjur"

Working on CyberArk PAS Self hosted aince last 15 years and last 3 years working on Conjur Enterprise to implement PAM and Secret Management solutions for Federal clients.

Read reviews

"Security, service support, adaptability"

The overall service is very good. Hope for the same supports in future.

Read reviews

"Secure secret management with HashiCorp Vault along with resources managed by Terrfaform"

I have been using HashiCorp Vault for over 7 years at 2 different workplaces. Even though I don't manage the infrastructure, but with my experience & it was deployed on cloud- never had issue accessing secrets, never had instance when Vault was down. It was built with HA, patched regularly to be complaint.

Read reviews

"Valuable and Effective PAM Solution"

The product fully meet our requirements, we have removed all local admin accounts on the servers and start managing them by SingleConnect, which improved the security on the server environment. All operations done by the administrators and logged and recorded on video with very small sizes. The implementation provides us to move our focus from the servers to other topics that need to be improved.

Read reviews
Products 1 - 20

Frequently Asked Questions

helpWhat are the core capabilities of Privileged Access Management tools?

PAM tools control privileged access for machines (systems or applications) for internal or machine-to-machine communication, and for people who administer or configure systems and applications. Some examples of core capabilities / features include:

  • Discovery of privileged accounts across multiple systems, infrastructure, and applications.

  • Credential management for privileged accounts.

  • Session establishment, management, monitoring, and recording for interactive privileged access.

  • Controlled elevation of commands for Unix/Linux and Windows.

  • Secrets management for applications, service, and devices.


helpWhat does deploying a PAM tool require?

Deploying a PAM tool properly requires two major things: A clear understanding of where the privileged accounts are (with a roadmap to secure them) and organizational process change to maximize the effectiveness of privileged access controls.


helpWhat are the best practices for Privileged Access Management (PAM) deployment?

One of the top drivers for PAM is to protect the business by reducing the attack surface. To succeed in PAM goals, organizations should focus on the following practices:

  • Track and secure every privileged account.

  • Govern and control access.

  • Record and audit privileged activity.

  • Operationalize privileged tasks.


helpHow many approaches are there available for privileged access management?

There are three distinct tool categories that highlight different PAM solutions. These categories include privileged account and session management (PASM), privilege elevation and delegation management (PEDM), and secrets management.

  • PASM: Passwords and other credentials for privileged accounts are actively managed, such as being changed at definable intervals or on the occurrence of specific events. PASM solutions can also manage (rotate) credentials for service accounts.

  • PEDM: Specific privileges are granted on the managed system by host-based agents to logged-in users. PEDM tools provide host-based command control (filtering) and privilege elevation for servers while they can also offer features for file integrity monitoring.

  • Secrets Management: Secrets management is often used in agile environments such as IaaS (Infrastructure as a service), PaaS (Platform as a service), or container management platforms. While it manages and stores credentials such as passwords through APIs and software development kits (SDKs), it can also provide application-to-application password management (AAPM).


helpWhat do Peer Insights reviewers recommend to implement PAM solutions?

Peer Insights reviewers share their experiences and highlight what advice they would give to other prospective customers. Below are some of the top recommendations:

  • List key PAM requirements across business units and obtain executive sponsorship.

  • Choose a PAM tool by balancing the required combination of use cases and conducting POCs.

  • Foster PAM skills prior to the implementation of the tool.

  • Modernize the existing IT stack and leverage the expertise of professional services to deploy the tool.