Best Privileged Access Management (PAM) Software

Products Buyer's Guide
8.0
Securden Windows Privilege Manager (Endpoint Privilege Management)
★★★★★

Securden Windows Privilege Manager (Endpoint Privilege Management)

Securden Windows Privilege Manager helps control and manage administrator privileges on endpoints. IT teams can remove local administrator rights on Windows servers and endpoints and seamlessly elevate applications for standard users. It also enables you to control application usage by remote employees through whitelisting and blacklisting and grant time-limited rights on-demand. Securden enables enforcing least privilege across the enterprise ...

Securden Windows Privilege Manager - Jacob V.

Ease of use
Support
Ease of Setup
5.0
Covisint Cloud Identity
★★★★★

Covisint Cloud Identity

Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

Ok, but outdated - Aakash P.

Ease of use
Support
Ease of Setup
10.0
BeyondTrust Password Safe
★★★★★

BeyondTrust Password Safe

Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achieve complete control and accountability over privileged accounts.

New Dynamics of Privelege Access Management with Beyond Trust - Faraz A.

Ease of use
Support
Ease of Setup
10.0
Thycotic Privilege Manager
★★★★★

Thycotic Privilege Manager

Proactive protection for endpoints, the entry point for 85% of all data breaches. Stop malware and ransomware from exploiting applications by removing local administrative rights from endpoints.

Excellent Tool for Securing Privileged Account Credentials - Sebastian K.

Ease of use
Support
Ease of Setup
10.0
Accops HyID
★★★★★

Accops HyID

HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked access by privileged users and provides detailed audit logs about who accessed what, from where and what time. The system can generate alerts based when an access by a user invalidates the set risk thresholds, enabling organizations to detect and prevent ...

Useful application for remote access - Abhishek D.

Ease of use
Support
Ease of Setup
0.0
CloudEnv
★★★★★

CloudEnv

Simple End-to-End Encrypted Cloud ENV Variables. Keep your ENV vars synced and versioned with your team (without Git). Simple CLI – Get started in seconds, not minutes. Trusted IP Addresses let you receive an email request before authorizing a new IP address access to your secrets.

-

Ease of use
Support
Ease of Setup

Languages supported: English

0.0
Universal Console
★★★★★

Universal Console

Universal Console acts as a single access gateway to all of your devices, controlling, monitoring and auditing access to network devices and servers. Unlike most Privileged Access Management solutions that require weeks or months to deploy, you can start taking control of privileged users such as system administrators, contractors, and third parties today.

-

Ease of use
Support
Ease of Setup
0.0
Devolutions Server
★★★★★

Devolutions Server

Managing and controlling access to privileged accounts and vaulting end-user passwords are of the utmost importance for any organization. With the growing concern over insider threats and data breaches, the real challenge we face is finding the right balance between keeping an organization's assets secure and allowing users to be productive. The remedy is a comprehensive, highly-secured vaulted password management solution that can control ...

-

Ease of use
Support
Ease of Setup

Languages supported: English, French

B2B Software Guide