• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Privileged Access Management

Privileged Access Management Reviews and Ratings

What are Privileged Access Management ?

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines five distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, cloud infrastructure entitlement management (CIEM) and remote PAM (RPAM).

Privileged access is access beyond the normal level granted to both human and machine accounts. It allows users to override existing access controls, change security configurations, or make changes affecting multiple users or systems. As privileged access can create, modify and delete IT infrastructure, along with company data contained in that infrastructure, it presents catastrophic risk. Managing privileged access is thus a critical security function for every organization and requires a specific set of procedures and tools. PAM tools focus on either privileged accounts or privileged commands.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Kron PAM
Kron PAM
Logo of Segura 360° Privilege Platform
Segura 360° Privilege Platform
Logo of Devolutions Remote Desktop Manager
Devolutions Remote Desktop Manager
For 50M-1B USD Companies
Logo of Iraje Privileged Access Manager
Iraje Privileged Access Manager
Logo of Server PAM
Server PAM
Logo of ARCON | Privileged Access Management
ARCON | Privileged Access Management
For North America
Logo of Iraje Privileged Access Manager
Iraje Privileged Access Manager
Logo of BeyondTrust Remote Support
BeyondTrust Remote Support
Logo of Devolutions Remote Desktop Manager
Devolutions Remote Desktop Manager
Integration & Deployment
Logo of Kron PAM
Kron PAM
Logo of ARCON | Privileged Access Management
ARCON | Privileged Access Management
Logo of Segura 360° Privilege Platform
Segura 360° Privilege Platform

Product Listings

Filter by

Products 1 - 20 of 106
Sort by
Logo of Secret Server

Secret Server

By Delinea

4.6
(1304 Ratings)

Secret Server is a software designed to provide organizations with security and management of privileged accounts. The software offers features such as secure storage, retrieval, and auditing of passwords and credentials for applications, devices, and services across an organization. It includes automated password rotation, access controls, session monitoring, and reporting to help mitigate risks associated with unauthorized access. The software addresses business challenges related to compliance requirements and protection against potential security breaches by ensuring that sensitive credentials are managed and monitored in a centralized platform.

Show More Details
Logo of CyberArk Privileged Access Manager

CyberArk Privileged Access Manager

By Palo Alto Networks (CyberArk)

4.4
(951 Ratings)

CyberArk Privileged Access Manager is a software designed to manage and secure privileged accounts across IT environments. It provides features such as credential management, session monitoring, and threat analytics to help organizations reduce risk associated with privileged access. The software offers automated auditing and centralized policy enforcement for controlling privileged account usage, aiming to prevent unauthorized access and limit the potential impact of credential misuse. It addresses the business problem of protecting sensitive data and systems from internal and external threats, supporting regulatory compliance and reducing attack surfaces related to privileged credentials.

Show More Details
Logo of ARCON | Privileged Access Management

ARCON | Privileged Access Management

By ARCON

4.8
(604 Ratings)
customers choice 2025

ARCON | Privileged Access Management (PAM)  helps enterprises protect privileged identities, databases, and applications, among a host of other forms of sensitive information/ assets, from insider and third-party threats, as well as vault, rotate, and manage credentials and secrets. ARCON PAM suite comes with a range of features and functionalities such as Access Control, Multi-factor Authentication (MFA), Single Sign-On (SSO), Session Management, Credential Management, Audit Trails, Just-in-Time Privileges, and Identity Threat Detection and Response (ITDR) capability among others. ARCON has its R&D center in Mumbai, India, and is headquartered in Houston, Texas, USA.

Show More Details
Logo of BeyondTrust Remote Support

BeyondTrust Remote Support

By BeyondTrust

4.7
(356 Ratings)

BeyondTrust Remote Support is a software designed to enable secure and efficient remote access to desktops, laptops, and mobile devices for IT professionals and support teams. The software facilitates remote troubleshooting, incident resolution, and maintenance without requiring end users to install software beforehand. Features include session management, screen sharing, chat communication, file transfer, and permissions management to ensure controlled access. The software integrates with IT service management platforms, supports multi-platform environments, and provides audit and reporting capabilities to help organizations address technical issues and minimize downtime. It is used to streamline support processes and improve operational efficiency.

Show More Details
Logo of Segura 360° Privilege Platform

Segura 360° Privilege Platform

By Segura

4.8
(328 Ratings)
customers choice 2025

Segura 360 Privilege Platform is a Privileged Access Management (PAM) solution designed to secure an organization's critical assets and data. It centrally manages, vaults, and rotates privileged credentials, enforces least privilege access policies, and provides secure, proxied connections like RDP/SSH/Databases with full session recording for auditability. By controlling and monitoring privileged access, Segura mitigates the risk of security breaches stemming from compromised credentials and helps organizations meet compliance requirements, preventing unauthorized access and insider threats.

Show More Details
Logo of BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access

By BeyondTrust

4.6
(293 Ratings)

BeyondTrust Privileged Remote Access is a software designed to enable secure and controlled remote access to internal systems for authorized users such as vendors and employees. The software provides session management capabilities that include granular access controls, real-time monitoring, and detailed audit trails to help organizations maintain accountability and visibility over privileged activity. It supports integration with identity management solutions and offers multi-factor authentication to strengthen security. Through its centralized platform, the software addresses business requirements for reducing the risks associated with unmanaged remote access, helping organizations enforce policies for privileged sessions and meeting regulatory compliance needs without requiring a virtual private network.

Show More Details
Logo of Iraje Privileged Access Manager

Iraje Privileged Access Manager

By Iraje Software

4.8
(291 Ratings)

Iraje Privileged Access Manager is a software designed to manage and control privileged user access within an organization's IT environment. The software provides comprehensive access management features, including credential vaulting, session monitoring, and real-time auditing of privileged activities. It enables organizations to enforce strict access policies, ensuring only authorized personnel have access to sensitive systems and data. By centralizing the management of privileged credentials, the software helps mitigate risks associated with unauthorized access and insider threats. Iraje Privileged Access Manager assists in maintaining regulatory compliance requirements by providing detailed reporting and analytics capabilities, thereby helping organizations strengthen their security posture and reduce potential vulnerabilities linked to privileged accounts.

Show More Details
Logo of ManageEngine Password Manager Pro

ManageEngine Password Manager Pro

By ManageEngine

4.3
(290 Ratings)

ManageEngine Password Manager Pro is a privileged password management software designed to help organizations securely store and manage sensitive passwords, documents, and digital identities. The software provides centralized vaulting, automated password resets, access control, and audit trails to enable administrative oversight and reduce the risk of unauthorized access to critical systems. It supports role-based access, policy enforcement, and integration with IT workflows and security tools. The software aims to streamline password management tasks, address compliance requirements, and mitigate risks associated with the misuse of privileged credentials within business environments.

Show More Details
Logo of Endpoint Privilege Management for Windows and Mac

Endpoint Privilege Management for Windows and Mac

By BeyondTrust

4.5
(234 Ratings)

Endpoint Privilege Management for Windows and Mac is a software designed to help organizations control and manage user privileges across endpoints running Windows and Mac operating systems. The software enables IT teams to enforce least privilege policies by allowing granular control over application and user permissions while minimizing the risk associated with excessive privileges. It provides centralized management, policy enforcement, and real-time privilege elevation to help reduce potential attack surfaces and mitigate unauthorized access. The software supports integration with existing security and directory systems, facilitating compliance with regulatory requirements and improving operational efficiency by streamlining user access controls and privilege management across endpoints.

Show More Details
Logo of BeyondTrust Password Safe

BeyondTrust Password Safe

By BeyondTrust

4.4
(226 Ratings)

BeyondTrust Password Safe is a software designed to provide secure management and control of privileged credentials within an organization. The software automates the discovery, onboarding, and management of privileged accounts, and centralizes the storage of passwords to reduce the risk of unauthorized access. It enforces access controls and session monitoring, enabling organizations to track and audit the use of privileged accounts. The software offers automated password rotation and policy enforcement to help address compliance requirements and minimize the risk of credential misuse. By controlling, managing, and auditing privileged access, the software addresses the challenge of protecting sensitive assets and reducing the risk of data breaches associated with compromised credentials.

Show More Details
Logo of WALLIX PAM

WALLIX PAM

By WALLIX

4.5
(208 Ratings)

WALLIX PAM is a software developed to manage and secure privileged access within enterprise IT infrastructures. The software offers tools for controlling, monitoring, and auditing privileged user activities, aiming to protect sensitive systems from unauthorized access and potential security breaches. Features include session recording, password management, real-time monitoring, access control, and compliance reporting. WALLIX PAM is used to reduce risks associated with privileged accounts, address regulatory compliance requirements, and ensure that administrative access to critical assets is limited, tracked, and managed according to organizational policies.

Show More Details
Logo of Devolutions Remote Desktop Manager

Devolutions Remote Desktop Manager

By Devolutions

4.7
(189 Ratings)

Remote Desktop Manager is an all-in-one platform designed to help IT professionals and organizations manage remote connections, credentials, and sensitive information securely. It enables users to centralize remote access, organize virtual environments, and streamline workflows across various systems and networks. With robust support for hundreds of integrated technologies, Remote Desktop Manager simplifies the management of remote connections, enhancing productivity and security. The platform is used by IT departments and teams to ensure efficient and secure access to critical systems, supporting enterprises in maintaining control over their IT infrastructure.

Show More Details
Logo of Sectona Security Platform

Sectona Security Platform

By Sectona

4.7
(186 Ratings)

Sectona Security Platform is a software designed to provide privileged access management by securing, managing, and monitoring privileged accounts and credentials within enterprise IT environments. The software enables organizations to control user sessions, enforce access policies, and audit activities to reduce risks associated with unauthorized access to sensitive systems. Sectona Security Platform supports a range of deployment scenarios including on-premises, cloud, and hybrid infrastructures, and integrates with multiple operating systems and applications. The software helps address business challenges related to compliance requirements, insider threats, and operational inefficiencies by automating privilege elevation, managing credentials, and providing session recording and real-time monitoring.

Show More Details
Logo of Server PAM

Server PAM

By Delinea

4.8
(137 Ratings)

Server PAM is a software developed to help organizations manage and secure privileged access to critical servers. The software offers centralized management of privileged accounts, session monitoring, and access control for server environments, aiming to minimize security risks associated with elevated permissions. Server PAM automates the discovery of privileged accounts, provides audit trails, and enforces policies to regulate access activities. It supports integration with existing identity management and authentication solutions, helping organizations address compliance requirements and reduce the attack surface associated with privileged credentials. The software is designed to operate in various on premise, cloud, and hybrid infrastructures to support complex IT environments.

Show More Details
Logo of CyberArk Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager

By Palo Alto Networks (CyberArk)

4.6
(122 Ratings)

CyberArk Endpoint Privilege Manager is a software designed to manage and secure endpoint privileges across enterprise environments. The software provides least privilege enforcement by allowing organizations to control and restrict administrative rights on endpoints without impacting user productivity. It supports application control to prevent the execution of unauthorized or unknown software and includes credential theft protection capabilities to help defend against attacks that target endpoints. CyberArk Endpoint Privilege Manager addresses business problems related to endpoint security risks, privilege escalation, and compliance by providing visibility and control over privileged access at the endpoint level. It is commonly used to reduce the attack surface and support regulatory requirements for privilege management in complex IT environments.

Show More Details
Logo of PAM360

PAM360

By ManageEngine

4.5
(109 Ratings)

PAM360 is a software developed by ManageEngine that focuses on privileged access management for IT environments. The software provides capabilities for managing and controlling privileged accounts, enabling organizations to secure and automate the process of granting, monitoring, and auditing access to critical resources. PAM360 supports password management, session monitoring, access request workflows, and compliance reporting. It integrates with various IT systems to facilitate centralized oversight of privileged access, helping organizations address security risks related to sensitive account credentials and reducing the chances of unauthorized access. PAM360 aids in streamlining access governance and ensuring regulatory compliance in enterprise networks.

Show More Details
Logo of Kron PAM

Kron PAM

By Kron

4.8
(100 Ratings)

Kron PAM is a software developed to manage privileged access and enhance security for organizations. It enables centralized control and monitoring of privileged accounts, providing session recording, password management, and user activity auditing. The software helps prevent unauthorized access and supports regulatory compliance by tracking and restricting the use of sensitive credentials. Kron PAM addresses the business problem of mitigating risks associated with privileged account misuse and insider threats by offering automation of credential management, detailed reporting, and role-based access controls, thereby protecting critical infrastructure and data assets.

Show More Details
Logo of One Identity Safeguard

One Identity Safeguard

By One Identity

4.3
(98 Ratings)

One Identity Safeguard is a software designed to provide secure privileged access management for IT environments. It helps organizations control, monitor, and record privileged accounts and session activities, reducing the risk associated with elevated access. The software integrates password management, session monitoring, and audit capabilities to protect sensitive systems and data by managing privileged credentials and access rights. One Identity Safeguard supports compliance initiatives by generating detailed reports on privileged actions and access patterns, enabling organizations to enforce policies and meet regulatory requirements. The software facilitates automated workflows for granting and revoking access, contributing to operational efficiency and minimized risk of unauthorized activities.

Show More Details
Logo of Conjur Secrets Manager Enterprise

Conjur Secrets Manager Enterprise

By Palo Alto Networks (CyberArk)

4.3
(89 Ratings)

Conjur Secrets Manager Enterprise is a software designed to secure and manage secrets such as passwords, API keys, and certificates used by applications, containers, and DevOps tools. The software provides centralized policy-driven control for secrets management, enabling organizations to define and manage access permissions for sensitive credentials across distributed environments. It helps manage machine identities and controls access to resources by enforcing authentication and authorization policies. The software integrates with various platforms and infrastructures, addressing the challenge of securing secrets at scale in modern application development and deployment pipelines. Its features are aimed at reducing the risk of unauthorized access and minimizing exposure of credentials within automated workflows and across multi-cloud or hybrid environments.

Show More Details
Logo of Privilege Manager

Privilege Manager

By Delinea

4.4
(77 Ratings)

Privilege Manager is a software designed to support organizations in managing privileged access and application control across endpoints. The software enables the application of least privilege policies by allowing administrators to grant or restrict privileges for users and processes, thereby reducing the risk of unauthorized access. Privilege Manager offers features such as automated privilege elevation, granular policy enforcement, and real-time monitoring of user activities. It assists in meeting compliance requirements by recording privileged actions and providing detailed audit logs. The software addresses the challenge of minimizing potential security risks associated with elevated permissions while maintaining operational efficiency for end users. Privilege Manager is primarily utilized to control and monitor privileged credentials, helping organizations protect sensitive systems and data.

Show More Details

Features of Privileged Access Management

Updated November 2025

Mandatory Features:

  • Centralized management and enforcement of privileged access by controlling either access to privileged accounts and credentials or execution of privileged commands (or both)

  • Vaulting, rotation and management of privileged credentials

  • Managing and brokering privileged access to authorized human users (e.g., system administrators, operators and help desk staff) and authorized machines (e.g., systems, applications, workloads etc.) on a temporary basis

  • Management, monitoring, recording and auditing for privileged sessions, including remote privileged sessions

  • Just-in-time privilege management, which reduces the time and scope for which a user is granted privileged access

  • Account discovery and onboarding of privileged accounts across multiple systems, applications and cloud infrastructure providers

  • Role-based administration, including centralized policy management for controlling access to credentials and privileged actions, when applicable

Peer Lessons Learned for Privileged Access Management

Published May 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Privileged Access ManagementLessons learned by your peers shared on Gartner Peer Insights for Privileged Access ManagementPeer Lessons Learned for Privileged Access ManagementLesson 1LESSON1Involve Stakeholders While Identifying YourOrganization's PAM Needs and Use CasesLesson 2LESSON2Perform POCs to Test PAM Tools and ConsiderTotal Cost of Ownership During SelectionLesson 3LESSON3Drive PAM Tool Adoption and Usage ThroughExtensive Training and Vendor ResourcesLesson 4LESSON4Streamline Processes and Set a GovernanceFramework for Tool DeploymentLesson 5LESSON5Deploy the PAM Tool in Phases; Rely on anImplementation Expert for SeamlessConfigurationn = 295Source: Reviews (295) submitted to Gartner Peer InsightsID: 6512572Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Privileged Access ManagementCritical Capabilities for Privileged Access Management
Gartner Peer Insights 'Voice of the Customer': Privileged Access Management

Top Trending Products

WALLIX PAMARCON | Privileged Access ManagementSectona Security PlatformSegura 360° Privilege PlatformSecret ServerManageEngine Password Manager ProCyberArk Privileged Access ManagerPrivilege ManagerEndpoint Privilege Management for Windows and MacPAM360

Popular Product Comparisons

HashiCorp Vault vs Secret ServerCyberArk Privileged Access Manager vs Secret ServerCyberArk Privileged Access Manager vs PAM360ManageEngine Password Manager Pro vs PAM360Conjur Secrets Manager Enterprise vs CyberArk Privileged Access ManagerConjur Secrets Manager Enterprise vs HashiCorp VaultCyberArk Privileged Access Manager vs HashiCorp Vault

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.