• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Privileged Access Management

Privileged Access Management Reviews and Ratings

What are Privileged Access Management ?

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines five distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, cloud infrastructure entitlement management (CIEM) and remote PAM (RPAM).

Privileged access is access beyond the normal level granted to both human and machine accounts. It allows users to override existing access controls, change security configurations, or make changes affecting multiple users or systems. As privileged access can create, modify and delete IT infrastructure, along with company data contained in that infrastructure, it presents catastrophic risk. Managing privileged access is thus a critical security function for every organization and requires a specific set of procedures and tools. PAM tools focus on either privileged accounts or privileged commands.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Kron PAM
Kron PAM
Logo of Segura 360° Privilege Platform
Segura 360° Privilege Platform
Logo of Devolutions Remote Desktop Manager
Devolutions Remote Desktop Manager
For 50M-1B USD Companies
Logo of Iraje Privileged Access Manager
Iraje Privileged Access Manager
Logo of Server PAM
Server PAM
Logo of ARCON | Privileged Access Management
ARCON | Privileged Access Management
For North America
Logo of Iraje Privileged Access Manager
Iraje Privileged Access Manager
Logo of BeyondTrust Remote Support
BeyondTrust Remote Support
Logo of Devolutions Remote Desktop Manager
Devolutions Remote Desktop Manager
Integration & Deployment
Logo of Kron PAM
Kron PAM
Logo of Segura 360° Privilege Platform
Segura 360° Privilege Platform
Logo of Iraje Privileged Access Manager
Iraje Privileged Access Manager

Product Listings

Filter by

Products 1 - 20 of 100
Sort by
Logo of Secret Server

Secret Server

By Delinea

4.6
(1302 Ratings)

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Show More Details
Logo of CyberArk Privileged Access Manager

CyberArk Privileged Access Manager

By CyberArk

4.4
(949 Ratings)

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details
Logo of ARCON | Privileged Access Management

ARCON | Privileged Access Management

By ARCON

4.8
(559 Ratings)
customers choice 2025

ARCON is one of the trusted risk-control solution providers for enterprises across the globe. Our product development strategy is based on constant interactions and research across all industries, with thought leaders, and cyber security consultants. It allows us to understand various emerging IT

security threats and the extent of sophistication for organizations worldwide. Subsequently,

we brainstorm and innovate trends and tactics to enable large, medium or small organizations

overcome humongous challenges related to information security.

Show More Details
Logo of BeyondTrust Remote Support

BeyondTrust Remote Support

By BeyondTrust

4.7
(355 Ratings)

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details
Logo of Segura 360° Privilege Platform

Segura 360° Privilege Platform

By Segura

4.8
(322 Ratings)
customers choice 2025

Segura (formerly senhasegura) is a cybersecurity company focused on Privileged Access Management (PAM). Its platform helps organizations secure and manage privileged identities, credentials, and secrets across hybrid and cloud environments. Segura supports use cases such as credential vaulting, session monitoring, privilege elevation, and secrets management for DevOps. Segura provides IT teams with visibility, control, and tools to reduce risk and support compliance.

The company serves customers across key sectors including finance, healthcare, government, telecom, and critical infrastructure.

Show More Details
Logo of BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access

By BeyondTrust

4.6
(292 Ratings)

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details
Logo of Iraje Privileged Access Manager

Iraje Privileged Access Manager

By Iraje Software

4.8
(290 Ratings)

Iraje is a company focused on providing enterprise security solutions. Its core specialty lies in administering Privileged Identity and Access Management (PIM/PAM) solutions for businesses around the globe. With a drive to innovate within the PIM/PAM niche, the company intends to supply differentiated solutions offering enhanced value. An aspect of Iraje's approach includes the commitment to outcome-based models ensuring successful services.

Show More Details
Logo of ManageEngine Password Manager Pro

ManageEngine Password Manager Pro

By ManageEngine

4.3
(287 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Endpoint Privilege Management for Windows and Mac

Endpoint Privilege Management for Windows and Mac

By BeyondTrust

4.4
(235 Ratings)

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details
Logo of BeyondTrust Password Safe

BeyondTrust Password Safe

By BeyondTrust

4.4
(225 Ratings)

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details
Logo of WALLIX PAM

WALLIX PAM

By WALLIX

4.5
(203 Ratings)

WALLIX is a European firm that specializes in providing Cybersecurity solutions. The company's offerings are designed to address data protection issues, enabling companies to detect and bounce back from cyber threats, ensuring the continuity of business operations. In addition, the firm's solutions also aid in the compliance with regulations pertaining to access to IT infrastructures and critical data. WALLIX operates a substantial distribution network comprising resellers and integrators across the globe, and actively aids more than 2000 organizations in securing their digital transformation. Moreover, WALLIX has a sub-brand, OT.security, dedicated to securing digital access and identities in industrial settings. The firm is devoted to building a trusted European digital space that ensures data security and confidentiality for organizations and individuals alike, promoting an ethical and responsible use of digital technology.

Show More Details
Logo of Devolutions Remote Desktop Manager

Devolutions Remote Desktop Manager

By Devolutions

4.7
(189 Ratings)

Devolutions, with a user base nearing 800,000 across more than 140 countries, offers a variety of network management tools. Established in 2010, the company's main focus is to improve IT department efficiency by providing cost-effective, user-friendly management tools followed by a high-standard support team. Based in Montreal, Canada, Devolutions is privately owned. The company's flagship product, Remote Desktop Manager (RDM), allows IT managers to regulate their remote connections and privileged passwords. RDM amalgamates multiple remote connection tools and protocols such as RDP, VPN, VNC, SSH, Teamviewer, LogMeIn, Putty and many more. Additional products include Password Hub Business, Devolutions Server, and a series of free tools intended to streamline the workload on developers.

Show More Details
Logo of Sectona Security Platform

Sectona Security Platform

By Sectona

4.6
(174 Ratings)

Sectona is a company that specializes in Privileged Access Management (PAM). This business provides enterprises with a solution to manage the risk associated with privileged account misuse. Through its integrated and user-friendly components, it offers security to the diverse remote workforce and their access points across onsite or cloud-based workloads, endpoints and machine-to-machine communication. The Sectona PAM tool is equipped with a single console to handle all privilege-related concerns in one location. Features such as Password Vaulting, Cross-Platform Technology Management and Endpoint Privilege Management, Just-in-Time Access, Privileged Task Automation, and Account Lifecycle Management are included. Launched in 2017, Sectona operates globally with bases in Mumbai and Dubai. Research and consulting firms have acknowledged the significance of Sectona PAM in the cybersecurity industry.

Show More Details
Logo of Server PAM

Server PAM

By Delinea

4.8
(137 Ratings)

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Show More Details
Logo of CyberArk Endpoint Privilege Manager

CyberArk Endpoint Privilege Manager

By CyberArk

4.5
(122 Ratings)

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details
Logo of PAM360

PAM360

By ManageEngine

4.4
(108 Ratings)

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details
Logo of Kron PAM

Kron PAM

By Kron

4.8
(100 Ratings)

Kron Technologies is a company that produces high technology solutions for the operational efficiency and security needs of corporate enterprises in various sectors, especially telecommunications. Kron offers innovative products and services in the fields of access control systems, service activation, and cybersecurity.

Show More Details
Logo of One Identity Safeguard

One Identity Safeguard

By One Identity

4.3
(98 Ratings)

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide.

Show More Details
Logo of Conjur Secrets Manager Enterprise

Conjur Secrets Manager Enterprise

By CyberArk

4.3
(89 Ratings)

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details
Logo of Symantec Privileged Access Management

Symantec Privileged Access Management

By Broadcom

4.3
(77 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details

Features of Privileged Access Management

Updated November 2025

Mandatory Features:

  • Centralized management and enforcement of privileged access by controlling either access to privileged accounts and credentials or execution of privileged commands (or both)

  • Vaulting, rotation and management of privileged credentials

  • Managing and brokering privileged access to authorized human users (e.g., system administrators, operators and help desk staff) and authorized machines (e.g., systems, applications, workloads etc.) on a temporary basis

  • Management, monitoring, recording and auditing for privileged sessions, including remote privileged sessions

  • Just-in-time privilege management, which reduces the time and scope for which a user is granted privileged access

  • Account discovery and onboarding of privileged accounts across multiple systems, applications and cloud infrastructure providers

  • Role-based administration, including centralized policy management for controlling access to credentials and privileged actions, when applicable

Peer Lessons Learned for Privileged Access Management

Published May 2025

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Privileged Access ManagementLessons learned by your peers shared on Gartner Peer Insights for Privileged Access ManagementPeer Lessons Learned for Privileged Access ManagementLesson 1LESSON1Involve Stakeholders While Identifying YourOrganization's PAM Needs and Use CasesLesson 2LESSON2Perform POCs to Test PAM Tools and ConsiderTotal Cost of Ownership During SelectionLesson 3LESSON3Drive PAM Tool Adoption and Usage ThroughExtensive Training and Vendor ResourcesLesson 4LESSON4Streamline Processes and Set a GovernanceFramework for Tool DeploymentLesson 5LESSON5Deploy the PAM Tool in Phases; Rely on anImplementation Expert for SeamlessConfigurationn = 295Source: Reviews (295) submitted to Gartner Peer InsightsID: 6512572Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Privileged Access ManagementCritical Capabilities for Privileged Access Management
Gartner Peer Insights 'Voice of the Customer': Privileged Access Management

Top Trending Products

ARCON | Privileged Access ManagementSegura 360° Privilege PlatformBeyondTrust Remote SupportSectona Security PlatformPAM360BeyondTrust Privileged Remote AccessEndpoint Privilege Management for Windows and MacKeeperPAMSecret ServerCyberArk Privileged Access Manager

Popular Product Comparisons

HashiCorp Vault vs Secret ServerCyberArk Privileged Access Manager vs Secret ServerCyberArk Privileged Access Manager vs PAM360Conjur Secrets Manager Enterprise vs CyberArk Privileged Access ManagerManageEngine Password Manager Pro vs PAM360Conjur Secrets Manager Enterprise vs HashiCorp VaultCyberArk Privileged Access Manager vs HashiCorp Vault

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.