Symantec PAM

Centrally manage and unify privileged user policies across multiple physical and virtual environments. Users can securely access critical IT resources without gaining a footprint on the network—while you monitor all activity across your entire IT infrastructure.

Languages supported: English, Japanese

6.8/10 (Expert Score) ★★★★★
Product is rated as #31 in category Privileged Access Management (PAM) Software
Ease of use
7.2
Support
6.7
Ease of Setup
0.0

Images

Check Software Images

Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring and recording privileged user activity across virtual, cloud, and
physical environments. The solution provides a privileged credential vault, session recording, threat analytics, host-based access control for mission-critical servers, and application-to-application password management to address non-human actors, such as applications, configuration files, and scripts.

Symantec PAM
Symantec PAM

Show more categories

Customer Reviews

Symantec PAM Reviews

Administrator in Information Technology and Services

Advanced user of Symantec PAM
★★★★★
Amazing

What do you like best?

Initially the ease of deploying the appliances. It has gotten more difficult due to our growing knowledge and desire for greater HA and redundancy. Rotating a password either manually or via scheduled job works as expected.

What do you dislike?

It doesn't integrate with all of our products and there is no agent for the Mainframe to allow for A2A to initiate from the mainframe to the mainframe or other distributed systems.

Recommendations to others considering the product:

Make sure you have buy in from the top. No solution for this is cheap and you must have CEO, CISO approval for such a product. They can help sell it to the other groups in the organization. If you don't have buy in, people will find back doors or reasons they can't use the solution. Remind them that this could (if implemented properly) eliminate audit findings!

What problems are you solving with the product? What benefits have you realized?

Our company had home-grown solutions for managing root on linux and admin on windows servers. They worked but were not designed with the strictest security in mind. Home grown solutions become a problem over time. The people that created them move on and people lose documentation on how to support it. It also can be difficult to upgrade as OS changes come about. We needed a more robust product that could be supported exclusively by the security team. We needed a better option for protecting privileged application IDs especially in our LINUX systems. We needed a product that could stand up to a SOX, PCI and/or HIPAA audit.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide