Privileged Access Management Reviews and Ratings

What are Privileged Access Management ?

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).

Product Listings

Filter by

Products 1 - 20 of 102

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Show More Details

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details

ARCON is one of the trusted risk-control solution providers for enterprises across the globe. Our product development strategy is based on constant interactions and research across all industries, with thought leaders, and cyber security consultants. It allows us to understand various emerging IT

security threats and the extent of sophistication for organizations worldwide. Subsequently,

we brainstorm and innovate trends and tactics to enable large, medium or small organizations

overcome humongous challenges related to information security.

Show More Details

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details

Iraje is a company focused on providing enterprise security solutions. Its core specialty lies in administering Privileged Identity and Access Management (PIM/PAM) solutions for businesses around the globe. With a drive to innovate within the PIM/PAM niche, the company intends to supply differentiated solutions offering enhanced value. An aspect of Iraje's approach includes the commitment to outcome-based models ensuring successful services.

Show More Details

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details

Segura (formerly senhasegura) is a cybersecurity company focused on Privileged Access Management (PAM). Its platform helps organizations secure and manage privileged identities, credentials, and secrets across hybrid and cloud environments. Segura supports use cases such as credential vaulting, session monitoring, privilege elevation, and secrets management for DevOps. Segura provides IT teams with visibility, control, and tools to reduce risk and support compliance.

The company serves customers across key sectors including finance, healthcare, government, telecom, and critical infrastructure.

Show More Details

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details

WALLIX is a European firm that specializes in providing Cybersecurity solutions. The company's offerings are designed to address data protection issues, enabling companies to detect and bounce back from cyber threats, ensuring the continuity of business operations. In addition, the firm's solutions also aid in the compliance with regulations pertaining to access to IT infrastructures and critical data. WALLIX operates a substantial distribution network comprising resellers and integrators across the globe, and actively aids more than 2000 organizations in securing their digital transformation. Moreover, WALLIX has a sub-brand, OT.security, dedicated to securing digital access and identities in industrial settings. The firm is devoted to building a trusted European digital space that ensures data security and confidentiality for organizations and individuals alike, promoting an ethical and responsible use of digital technology.

Show More Details

BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.

Show More Details

Devolutions, with a user base nearing 800,000 across more than 140 countries, offers a variety of network management tools. Established in 2010, the company's main focus is to improve IT department efficiency by providing cost-effective, user-friendly management tools followed by a high-standard support team. Based in Montreal, Canada, Devolutions is privately owned. The company's flagship product, Remote Desktop Manager (RDM), allows IT managers to regulate their remote connections and privileged passwords. RDM amalgamates multiple remote connection tools and protocols such as RDP, VPN, VNC, SSH, Teamviewer, LogMeIn, Putty and many more. Additional products include Password Hub Business, Devolutions Server, and a series of free tools intended to streamline the workload on developers.

Show More Details

Sectona is a company that specializes in Privileged Access Management (PAM). This business provides enterprises with a solution to manage the risk associated with privileged account misuse. Through its integrated and user-friendly components, it offers security to the diverse remote workforce and their access points across onsite or cloud-based workloads, endpoints and machine-to-machine communication. The Sectona PAM tool is equipped with a single console to handle all privilege-related concerns in one location. Features such as Password Vaulting, Cross-Platform Technology Management and Endpoint Privilege Management, Just-in-Time Access, Privileged Task Automation, and Account Lifecycle Management are included. Launched in 2017, Sectona operates globally with bases in Mumbai and Dubai. Research and consulting firms have acknowledged the significance of Sectona PAM in the cybersecurity industry.

Show More Details

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Show More Details

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide.

Show More Details

Focusing on Identity Security, CyberArk is a specialist in privileged access management. It develops secure solutions for diverse identities - human or machine to cater to numerous business applications. The company ensures protection across varied work environments like distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. CyberArk's primary objective is to avert cyberattacks that abuse insider privileges and pose a threat to crucial enterprise assets. In addition to this focus, the company offers security solutions aimed at preventing the progression of cyber threats, thus protecting businesses from substantial damage. CyberArk's security solutions align with rigorous compliance and audit requirements to service businesses' need to guard their most valued possessions. The company has a global presence with offices spread across countries like the U.S., Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.

Show More Details

As the enterprise IT management division of Zoho Corp., ManageEngine empowers you to take control of your IT, from your security, networks, and servers to your applications, service desk, Active Directory, desktops, and mobile devices.

Show More Details

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details

IBM is a well-established entity focused on technology and development. The primary mission revolves around fostering technological growth and enhancing infrastructure, achieved through focused developments and consulting services. By encouraging inventiveness and innovation, it is geared towards facilitating the transition of theoretical ideas into practical realities, thus improving global functionalities. IBM brings about transformation by creating advanced solutions that reshape and redefine the world.

Show More Details