Introducing G2.ai, the future of software buying.Try now

Best Privileged Access Management (PAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts

Best Privileged Access Management (PAM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
152 Listings in Privileged Access Management (PAM) Available
(3,342)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a cloud-based directory platform that offers device management, Single Sign-On (SSO), Zero Trust, and SaaS Management functionalities.
    • Reviewers frequently mention JumpCloud's adaptability due to its support for multiple operating systems, its ease of use, efficient user and device management, and seamless integrations with tools like Google Workspace and M365.
    • Users reported issues with JumpCloud's status transparency, difficulty in finding information about unsupported features, a steep learning curve for new admins, and occasional lag in real-time device status updates.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    783
    Device Management
    605
    Integrations
    475
    Security
    401
    Easy Integrations
    384
    Cons
    Missing Features
    274
    Improvement Needed
    227
    Limited Features
    174
    MDM Issues
    117
    UX Improvement
    115
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Reporting
    Average: 8.7
    8.4
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    900 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a cloud-based directory platform that offers device management, Single Sign-On (SSO), Zero Trust, and SaaS Management functionalities.
  • Reviewers frequently mention JumpCloud's adaptability due to its support for multiple operating systems, its ease of use, efficient user and device management, and seamless integrations with tools like Google Workspace and M365.
  • Users reported issues with JumpCloud's status transparency, difficulty in finding information about unsupported features, a steep learning curve for new admins, and occasional lag in real-time device status updates.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
783
Device Management
605
Integrations
475
Security
401
Easy Integrations
384
Cons
Missing Features
274
Improvement Needed
227
Limited Features
174
MDM Issues
117
UX Improvement
115
JumpCloud features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.5
Reporting
Average: 8.7
8.4
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,880 Twitter followers
LinkedIn® Page
www.linkedin.com
900 employees on LinkedIn®
(792)4.5 out of 5
6th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    115
    Security
    104
    Identity Management
    87
    Single Sign-On
    67
    Integrations
    60
    Cons
    Expensive
    49
    Integration Issues
    33
    Cost
    29
    Complexity
    26
    Missing Features
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    8.8
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 37% Mid-Market
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
115
Security
104
Identity Management
87
Single Sign-On
67
Integrations
60
Cons
Expensive
49
Integration Issues
33
Cost
29
Complexity
26
Missing Features
24
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
8.8
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 42% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Secrets Manager features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    8.9
    Approval Workflows
    Average: 8.7
    7.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,229,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,150 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API k

Users
No information available
Industries
  • Computer Software
Market Segment
  • 42% Enterprise
  • 21% Mid-Market
AWS Secrets Manager features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
8.9
Approval Workflows
Average: 8.7
7.8
Audit log
Average: 8.7
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,229,471 Twitter followers
LinkedIn® Page
www.linkedin.com
143,150 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(74)4.8 out of 5
2nd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

    Users
    • Information Security Analyst
    Industries
    • Telecommunications
    • Government Administration
    Market Segment
    • 70% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Segura 360° Privilege Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Security
    26
    Customer Support
    16
    Access Management
    10
    Password Management
    6
    Cons
    Documentation
    4
    Expensive
    4
    UX Improvement
    4
    Complex Coding
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.7
    9.4
    Approval Workflows
    Average: 8.7
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Segura
    Year Founded
    2010
    HQ Location
    São Paulo, São Paulo
    LinkedIn® Page
    www.linkedin.com
    241 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

Users
  • Information Security Analyst
Industries
  • Telecommunications
  • Government Administration
Market Segment
  • 70% Enterprise
  • 22% Mid-Market
Segura 360° Privilege Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Security
26
Customer Support
16
Access Management
10
Password Management
6
Cons
Documentation
4
Expensive
4
UX Improvement
4
Complex Coding
3
Lack of Features
3
Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.7
9.4
Approval Workflows
Average: 8.7
9.4
Audit log
Average: 8.7
Seller Details
Seller
Segura
Year Founded
2010
HQ Location
São Paulo, São Paulo
LinkedIn® Page
www.linkedin.com
241 employees on LinkedIn®
(348)4.7 out of 5
4th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 49% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Remote Support Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Remote Access
    34
    Security Focus
    20
    Security
    19
    Remote Support
    16
    Cons
    Expensive
    17
    Pricing Issues
    8
    Remote Access Issues
    7
    Complexity
    6
    Connectivity Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Remote Support features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    7.5
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 49% Enterprise
  • 34% Mid-Market
BeyondTrust Remote Support Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Remote Access
34
Security Focus
20
Security
19
Remote Support
16
Cons
Expensive
17
Pricing Issues
8
Remote Access Issues
7
Complexity
6
Connectivity Issues
5
BeyondTrust Remote Support features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
7.5
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
(82)4.5 out of 5
24th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    583,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,342 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
583,254 Twitter followers
LinkedIn® Page
www.linkedin.com
78,342 employees on LinkedIn®
Ownership
NYSE:CRM
(91)4.7 out of 5
Optimized for quick response
13th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$70.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 15% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • StrongDM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    15
    Easy Integrations
    8
    Access Control
    6
    Easy Management
    6
    Cons
    Expensive
    5
    UX Improvement
    4
    Documentation
    3
    Integration Issues
    3
    Limited Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StrongDM features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.6
    Reporting
    Average: 8.7
    8.0
    Approval Workflows
    Average: 8.7
    8.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    strongDM
    Company Website
    Year Founded
    2015
    HQ Location
    Burlingame, California
    Twitter
    @strongdm
    755 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    159 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StrongDM is the leader in Zero Trust PAM. We are a policy-based platform that enables precise control over privileged actions and grants secure, compliant, frustration-free access to all critical infr

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 15% Small-Business
StrongDM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
15
Easy Integrations
8
Access Control
6
Easy Management
6
Cons
Expensive
5
UX Improvement
4
Documentation
3
Integration Issues
3
Limited Features
3
StrongDM features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
7.6
Reporting
Average: 8.7
8.0
Approval Workflows
Average: 8.7
8.7
Audit log
Average: 8.7
Seller Details
Seller
strongDM
Company Website
Year Founded
2015
HQ Location
Burlingame, California
Twitter
@strongdm
755 Twitter followers
LinkedIn® Page
www.linkedin.com
159 employees on LinkedIn®
(64)4.5 out of 5
View top Consulting Services for Google Cloud Identity & Access Management (IAM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fine-grained access control and visibility for centrally managing cloud resources.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 19% Small-Business
    • 11% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Google Cloud Identity & Access Management (IAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Ease of Use
    1
    Easy Integrations
    1
    Flexibility
    1
    Cons
    Internet Dependency
    1
    Lack of Features
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.7
    Reporting
    Average: 8.7
    9.7
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Fine-grained access control and visibility for centrally managing cloud resources.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 19% Small-Business
  • 11% Enterprise
Google Cloud Identity & Access Management (IAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Ease of Use
1
Easy Integrations
1
Flexibility
1
Cons
Internet Dependency
1
Lack of Features
1
Limited Features
1
Google Cloud Identity & Access Management (IAM) features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
9.7
Reporting
Average: 8.7
9.7
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
(43)4.5 out of 5
15th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Remote Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    2
    Auditing
    2
    Secure Access
    2
    Security
    2
    Accessibility
    1
    Cons
    Complex Usage
    1
    Limited OS Compatibility
    1
    Poor Customer Support
    1
    Poor Navigation
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Reporting
    Average: 8.7
    9.1
    Approval Workflows
    Average: 8.7
    9.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 35% Enterprise
BeyondTrust Privileged Remote Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
2
Auditing
2
Secure Access
2
Security
2
Accessibility
1
Cons
Complex Usage
1
Limited OS Compatibility
1
Poor Customer Support
1
Poor Navigation
1
UX Improvement
1
BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.3
Reporting
Average: 8.7
9.1
Approval Workflows
Average: 8.7
9.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
(17)4.8 out of 5
7th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    1.7
    Reporting
    Average: 8.7
    0.0
    No information available
    5.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
1.7
Reporting
Average: 8.7
0.0
No information available
5.0
Audit log
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
627 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
(17)4.5 out of 5
17th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Conjur Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Services
    1
    Security
    1
    Useful
    1
    Cons
    Improvements Needed
    1
    Inadequate Tracking
    1
    Inefficiency
    1
    User Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Conjur features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.7
    9.0
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

For enterprises who need to protect their infrastructure, CyberArk Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
CyberArk Conjur Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Services
1
Security
1
Useful
1
Cons
Improvements Needed
1
Inadequate Tracking
1
Inefficiency
1
User Difficulty
1
CyberArk Conjur features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.7
9.0
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(15)3.8 out of 5
9th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Endpoint Privilege Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Accessibility
    1
    Auditing
    1
    Centralized Management
    1
    Flexibility
    1
    Cons
    Setup Difficulty
    2
    Expensive
    1
    Integration Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    8.1
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
BeyondTrust Endpoint Privilege Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Accessibility
1
Auditing
1
Centralized Management
1
Flexibility
1
Cons
Setup Difficulty
2
Expensive
1
Integration Difficulty
1
BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
8.1
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
(30)4.7 out of 5
12th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Tenable Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    7
    Customer Support
    7
    Insights
    7
    Monitoring
    6
    Cons
    Limited Features
    5
    Feature Limitations
    3
    Improvement Needed
    3
    Lack of Features
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
7
Customer Support
7
Insights
7
Monitoring
6
Cons
Limited Features
5
Feature Limitations
3
Improvement Needed
3
Lack of Features
3
Missing Features
3
Tenable Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
(16)4.8 out of 5
8th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Admin By Request Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Customer Support
    7
    Ease of Configuration
    5
    Easy Integrations
    5
    Easy Setup
    5
    Cons
    Compatibility Issues
    3
    Access Control
    2
    Admin Limitations
    2
    Complex Administration
    2
    Deployment Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Admin By Request features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Reporting
    Average: 8.7
    9.9
    Approval Workflows
    Average: 8.7
    9.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Francisco, California
    Twitter
    @AdminByRequest
    2,374 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    111 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

𝗧𝗵𝗲 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 Admin By Request is a leading vendor of SaaS-based enterprise security solutions delivered via our award-winning Admin By Request Zero Trust Platform. Our global team can be found in offi

Users
No information available
Industries
No information available
Market Segment
  • 44% Mid-Market
  • 38% Enterprise
Admin By Request Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Customer Support
7
Ease of Configuration
5
Easy Integrations
5
Easy Setup
5
Cons
Compatibility Issues
3
Access Control
2
Admin Limitations
2
Complex Administration
2
Deployment Issues
2
Admin By Request features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.5
Reporting
Average: 8.7
9.9
Approval Workflows
Average: 8.7
9.5
Audit log
Average: 8.7
Seller Details
HQ Location
San Francisco, California
Twitter
@AdminByRequest
2,374 Twitter followers
LinkedIn® Page
www.linkedin.com
111 employees on LinkedIn®
(26)4.4 out of 5
16th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 81% Enterprise
    • 15% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingAccess features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.7
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,506 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Users
No information available
Industries
  • Accounting
Market Segment
  • 81% Enterprise
  • 15% Small-Business
PingAccess features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.7
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,506 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
(22)3.6 out of 5
19th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec PAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Cons
    Complex Setup
    1
    Time Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec PAM features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    6.9
    Approval Workflows
    Average: 8.7
    7.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec PAM is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring an

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 32% Mid-Market
Symantec PAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Cons
Complex Setup
1
Time Delays
1
Symantec PAM features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
6.9
Approval Workflows
Average: 8.7
7.3
Audit log
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(22)4.7 out of 5
3rd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    6
    Ease of Use
    5
    Features
    5
    Implementation Ease
    5
    Real-time Monitoring
    5
    Cons
    Limited Features
    3
    Insufficient Detail
    2
    Limited Customization
    2
    Slow Performance
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    9.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Needham, MA
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 36% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
6
Ease of Use
5
Features
5
Implementation Ease
5
Real-time Monitoring
5
Cons
Limited Features
3
Insufficient Detail
2
Limited Customization
2
Slow Performance
2
Alert Management
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
9.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2013
HQ Location
Needham, MA
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
(21)4.5 out of 5
14th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Password Safe Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Password Management
    3
    Customer Support
    2
    Ease of Use
    2
    Implementation Ease
    2
    Secure Access
    2
    Cons
    Complex Setup
    1
    Confusing Options
    1
    Expensive
    1
    Integration Difficulty
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Password Safe features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.5
    Approval Workflows
    Average: 8.7
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 29% Mid-Market
BeyondTrust Password Safe Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Password Management
3
Customer Support
2
Ease of Use
2
Implementation Ease
2
Secure Access
2
Cons
Complex Setup
1
Confusing Options
1
Expensive
1
Integration Difficulty
1
Poor Customer Support
1
BeyondTrust Password Safe features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.5
Approval Workflows
Average: 8.7
8.8
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lumos Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Automation
    8
    Security
    6
    Customer Support
    5
    Time-saving
    5
    Cons
    Missing Features
    4
    Limited Integrations
    3
    Access Control
    2
    App Functionality Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lumos features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lumos
    Company Website
    Year Founded
    2020
    HQ Location
    Silicon Valley, California
    Twitter
    @lumosidentity
    273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    149 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Mid-Market
  • 20% Enterprise
Lumos Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Automation
8
Security
6
Customer Support
5
Time-saving
5
Cons
Missing Features
4
Limited Integrations
3
Access Control
2
App Functionality Issues
2
Poor Customer Support
2
Lumos features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
Lumos
Company Website
Year Founded
2020
HQ Location
Silicon Valley, California
Twitter
@lumosidentity
273 Twitter followers
LinkedIn® Page
www.linkedin.com
149 employees on LinkedIn®
(12)4.3 out of 5
10th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Entitle Just-in-Time Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Easy Setup
    6
    Automation
    5
    Ease of Implementation
    5
    Ease of Use
    4
    Cons
    Complex Usage
    3
    Complexity
    2
    Complex Queries
    2
    Complex Usability
    2
    Connection Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    9.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
BeyondTrust Entitle Just-in-Time Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Easy Setup
6
Automation
5
Ease of Implementation
5
Ease of Use
4
Cons
Complex Usage
3
Complexity
2
Complex Queries
2
Complex Usability
2
Connection Issues
2
BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
9.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Manufacturing
    Market Segment
    • 83% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    10
    Data Classification
    9
    Ease of Use
    9
    Data Discovery
    8
    Security
    8
    Cons
    Expensive
    4
    Limitations
    4
    Complexity
    3
    Inefficiency
    3
    Management Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Reporting
    Average: 8.7
    7.5
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,292 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Manufacturing
Market Segment
  • 83% Enterprise
  • 28% Mid-Market
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
10
Data Classification
9
Ease of Use
9
Data Discovery
8
Security
8
Cons
Expensive
4
Limitations
4
Complexity
3
Inefficiency
3
Management Issues
3
Varonis Data Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.7
Reporting
Average: 8.7
7.5
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,292 Twitter followers
LinkedIn® Page
www.linkedin.com
2,510 employees on LinkedIn®
(66)4.4 out of 5
29th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 92% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Ease of Use
    6
    Connectivity
    4
    Device Management
    3
    Secure Access
    3
    Cons
    Connectivity Issues
    2
    Dependency Issues
    2
    Difficult Management
    2
    Difficult Setup
    2
    Integration Difficulty
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Reporting
    Average: 8.7
    8.8
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 92% Enterprise
  • 33% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Ease of Use
6
Connectivity
4
Device Management
3
Secure Access
3
Cons
Connectivity Issues
2
Dependency Issues
2
Difficult Management
2
Difficult Setup
2
Integration Difficulty
2
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.0
Reporting
Average: 8.7
8.8
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(194)4.7 out of 5
23rd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Starting at $30.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Remote Desktop Manager (RDM) is a comprehensive remote access management solution designed to help IT departments centralize and streamline all remote connections within an organization. By providing

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Remote Desktop Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Remote Access
    9
    User Interface
    7
    Easy Access
    6
    Device Management
    5
    Cons
    Slow Performance
    9
    Learning Curve
    3
    Limited OS Compatibility
    3
    Remote Access Issues
    3
    Screen Management
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    9.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Remote Desktop Manager (RDM) is a comprehensive remote access management solution designed to help IT departments centralize and streamline all remote connections within an organization. By providing

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 40% Mid-Market
Devolutions Remote Desktop Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Remote Access
9
User Interface
7
Easy Access
6
Device Management
5
Cons
Slow Performance
9
Learning Curve
3
Limited OS Compatibility
3
Remote Access Issues
3
Screen Management
3
Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
9.3
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,218 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
(106)4.4 out of 5
20th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$3 Per User Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Administration Management
    1
    Customer Management
    1
    Customer Support
    1
    Data Security
    1
    Cons
    Complex Administration
    2
    Complex Setup
    2
    Confusing Interface
    2
    Authentication Issues
    1
    Clunky Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,506 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,024 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Administration Management
1
Customer Management
1
Customer Support
1
Data Security
1
Cons
Complex Administration
2
Complex Setup
2
Confusing Interface
2
Authentication Issues
1
Clunky Interface
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,506 Twitter followers
LinkedIn® Page
www.linkedin.com
2,024 employees on LinkedIn®
Phone
1.303.468.2900
(16)4.3 out of 5
Optimized for quick response
18th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PrivX is a type of privileged access management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data in hybrid and multi-cloud environments. It addresse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSH PrivX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Security
    4
    Customer Support
    3
    Easy Integrations
    3
    Accessibility
    2
    Cons
    Integration Difficulty
    3
    Setup Difficulty
    3
    Limited OS Compatibility
    2
    Software Bugs
    2
    Audit Logging Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH PrivX features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    7.3
    Reporting
    Average: 8.7
    8.9
    Approval Workflows
    Average: 8.7
    8.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PrivX is a type of privileged access management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data in hybrid and multi-cloud environments. It addresse

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
SSH PrivX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Security
4
Customer Support
3
Easy Integrations
3
Accessibility
2
Cons
Integration Difficulty
3
Setup Difficulty
3
Limited OS Compatibility
2
Software Bugs
2
Audit Logging Issues
1
SSH PrivX features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
7.3
Reporting
Average: 8.7
8.9
Approval Workflows
Average: 8.7
8.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,398 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
(107)4.4 out of 5
Optimized for quick response
21st Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teleport Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    32
    Security
    22
    Access Control
    21
    Reliability
    15
    Easy Access
    14
    Cons
    Poor Documentation
    12
    Documentation
    11
    Difficult Setup
    9
    Lack of Information
    7
    Implementation Difficulty
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teleport features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.2
    Approval Workflows
    Average: 8.7
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teleport
    Company Website
    Year Founded
    2015
    HQ Location
    Oakland, California
    Twitter
    @goteleport
    3,743 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and com

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 36% Small-Business
Teleport Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
32
Security
22
Access Control
21
Reliability
15
Easy Access
14
Cons
Poor Documentation
12
Documentation
11
Difficult Setup
9
Lack of Information
7
Implementation Difficulty
6
Teleport features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.2
Approval Workflows
Average: 8.7
8.9
Audit log
Average: 8.7
Seller Details
Seller
Teleport
Company Website
Year Founded
2015
HQ Location
Oakland, California
Twitter
@goteleport
3,743 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
22nd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akeyless Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Customer Support
    10
    Security
    10
    Secure Storage
    5
    Easy Integrations
    4
    Cons
    Poor UI
    3
    Authentication Issues
    2
    Documentation
    2
    Lack of Features
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akeyless Platform features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Reporting
    Average: 8.7
    7.9
    Approval Workflows
    Average: 8.7
    7.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akeyless
    Company Website
    Year Founded
    2018
    HQ Location
    Ramat Gan, Israel
    Twitter
    @akeylessio
    260 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akeyless is transforming the landscape of identity security by delivering the world’s first Unified Secrets & Machine Identity Platform, tackling the #1 cause of cybersecurity breaches—compromised

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 30% Mid-Market
Akeyless Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Customer Support
10
Security
10
Secure Storage
5
Easy Integrations
4
Cons
Poor UI
3
Authentication Issues
2
Documentation
2
Lack of Features
2
Learning Curve
2
Akeyless Platform features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
7.9
Reporting
Average: 8.7
7.9
Approval Workflows
Average: 8.7
7.9
Audit log
Average: 8.7
Seller Details
Seller
Akeyless
Company Website
Year Founded
2018
HQ Location
Ramat Gan, Israel
Twitter
@akeylessio
260 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. With CloudEagle.ai, enterprises like RingCentral, Shiji, Recroom make

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 29% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CloudEagle.ai is a platform that automates the process of license management, providing insights into license usage, managing vendor data, and offering security and compliance services.
    • Users like the platform's ability to identify underutilized licenses, automate onboarding and offboarding processes, provide detailed license insights, and offer a user-friendly dashboard for managing all software in one place.
    • Users experienced some difficulties with the initial setup and understanding of the platform's features, the speed of the mobile app, and the platform's compatibility with certain old technologies.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudEagle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    20
    Ease of Use
    19
    Features
    16
    Time-Saving
    16
    Customer Support
    14
    Cons
    Difficult Learning
    9
    Complex Setup
    7
    Setup Difficulty
    6
    Difficult Setup
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudEagle features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.7
    9.4
    Approval Workflows
    Average: 8.7
    9.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Palo Alto, US
    Twitter
    @cloudeagleai
    124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. With CloudEagle.ai, enterprises like RingCentral, Shiji, Recroom make

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 29% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CloudEagle.ai is a platform that automates the process of license management, providing insights into license usage, managing vendor data, and offering security and compliance services.
  • Users like the platform's ability to identify underutilized licenses, automate onboarding and offboarding processes, provide detailed license insights, and offer a user-friendly dashboard for managing all software in one place.
  • Users experienced some difficulties with the initial setup and understanding of the platform's features, the speed of the mobile app, and the platform's compatibility with certain old technologies.
CloudEagle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
20
Ease of Use
19
Features
16
Time-Saving
16
Customer Support
14
Cons
Difficult Learning
9
Complex Setup
7
Setup Difficulty
6
Difficult Setup
5
Learning Curve
5
CloudEagle features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.7
9.4
Approval Workflows
Average: 8.7
9.3
Audit log
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Palo Alto, US
Twitter
@cloudeagleai
124 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
(34)3.9 out of 5
26th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Starts at $595 2 Admin...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Password Manager Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Efficiency
    1
    Implementation Ease
    1
    Cons
    Complex Setup
    1
    Connectivity Issues
    1
    Difficult Setup
    1
    Remote Access Issues
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Password Manager Pro offers a complete solution to control, manage, monitor, and audit the entire life-cycle of privileged access. In a single package, it offers four solutions - privileged account ma

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
ManageEngine Password Manager Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Efficiency
1
Implementation Ease
1
Cons
Complex Setup
1
Connectivity Issues
1
Difficult Setup
1
Remote Access Issues
1
Setup Difficulty
1
ManageEngine Password Manager Pro features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 84% Small-Business
    • 16% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Doppler secrets management platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Easy Integrations
    9
    Integrations
    6
    Flexibility
    5
    Security
    4
    Cons
    Expensive
    5
    Complex Setup
    3
    Setup Difficulty
    3
    Poor Navigation
    2
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 84% Small-Business
  • 16% Mid-Market
Doppler secrets management platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Easy Integrations
9
Integrations
6
Flexibility
5
Security
4
Cons
Expensive
5
Complex Setup
3
Setup Difficulty
3
Poor Navigation
2
Dependency Issues
1
Doppler secrets management platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,378 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
(41)4.4 out of 5
27th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Delinea Secret Server
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Secret Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Deployment Ease
    2
    Integrations
    2
    User Interface
    2
    Admin Control
    1
    Cons
    Software Bugs
    2
    Complex Usage
    1
    Documentation
    1
    Expensive
    1
    Implementation Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Secret Server features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    8.2
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Mid-Market
  • 29% Enterprise
Delinea Secret Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Deployment Ease
2
Integrations
2
User Interface
2
Admin Control
1
Cons
Software Bugs
2
Complex Usage
1
Documentation
1
Expensive
1
Implementation Difficulty
1
Delinea Secret Server features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
8.2
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
797 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
(34)4.8 out of 5
5th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$0 forever
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employe

    Users
    No information available
    Industries
    • Internet
    • Computer Software
    Market Segment
    • 65% Mid-Market
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Foxpass features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Foxpass
    Company Website
    Year Founded
    2015
    HQ Location
    San Francisco, CA
    Twitter
    @foxpass
    219 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employe

Users
No information available
Industries
  • Internet
  • Computer Software
Market Segment
  • 65% Mid-Market
  • 24% Small-Business
Foxpass features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Foxpass
Company Website
Year Founded
2015
HQ Location
San Francisco, CA
Twitter
@foxpass
219 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARCON's Privileged Access Management / Privileged Identity Management solution is a unique risk-control software, appliance (physical or virtual), and service provider in private cloud which helps saf

    Users
    • Consultant
    Industries
    • Information Technology and Services
    • Insurance
    Market Segment
    • 56% Mid-Market
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    7.1
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    7.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Arcon
    Year Founded
    2006
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @ARCONRiskCtrl
    1,113 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARCON's Privileged Access Management / Privileged Identity Management solution is a unique risk-control software, appliance (physical or virtual), and service provider in private cloud which helps saf

Users
  • Consultant
Industries
  • Information Technology and Services
  • Insurance
Market Segment
  • 56% Mid-Market
  • 40% Enterprise
ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
7.1
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
7.4
Audit log
Average: 8.7
Seller Details
Seller
Arcon
Year Founded
2006
HQ Location
Mumbai, Maharashtra
Twitter
@ARCONRiskCtrl
1,113 Twitter followers
LinkedIn® Page
www.linkedin.com
738 employees on LinkedIn®
(45)4.3 out of 5
30th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    9.3
    Approval Workflows
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    98,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,529 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
9.3
Approval Workflows
Average: 8.7
0.0
No information available
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
98,579 Twitter followers
LinkedIn® Page
www.linkedin.com
2,529 employees on LinkedIn®
Ownership
NASDAQ: HCP
(30)4.6 out of 5
25th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Opal is an authorization reasoning platform that empowers security and engineering teams to manage access and reduce identity risk at scale. We provide real-time visibility, prioritized insights, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 23% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Opal Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Reporting
    Average: 8.7
    9.1
    Approval Workflows
    Average: 8.7
    8.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @opal_sec
    149 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Opal is an authorization reasoning platform that empowers security and engineering teams to manage access and reduce identity risk at scale. We provide real-time visibility, prioritized insights, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 23% Enterprise
Opal Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.5
Reporting
Average: 8.7
9.1
Approval Workflows
Average: 8.7
8.2
Audit log
Average: 8.7
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@opal_sec
149 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Cloud Suite is a unified PAM platform for managing privileged access in multi-cloud infrastructure to seamlessly secure access and protect against identity-based cyberattacks. Cloud Suite sup

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Enterprise
    • 45% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Cloud Suite features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Cloud Suite is a unified PAM platform for managing privileged access in multi-cloud infrastructure to seamlessly secure access and protect against identity-based cyberattacks. Cloud Suite sup

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Enterprise
  • 45% Mid-Market
Delinea Cloud Suite features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
797 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
(54)4.3 out of 5
28th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seller Details
    Expand/Collapse Seller Details
(466)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is a tool designed to automate common admin tasks, manage Google admin settings, and integrate with Google Workspace.
    • Reviewers appreciate BetterCloud's ability to automate workflows, manage Google admin settings, and its integration with Google Workspace, highlighting its ease of use, robust interface, and the time-saving benefits of its automation features.
    • Reviewers experienced issues with BetterCloud's high cost, complex setup, limited technical support, and a user interface that could be improved, particularly for the Google Administration module.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    29
    Ease of Use
    21
    Onboarding
    21
    Features
    18
    Time-saving
    18
    Cons
    Limited Features
    15
    Integration Issues
    12
    Limited Integrations
    7
    Poor Interface Design
    7
    Workflow Limitations
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,260 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is a tool designed to automate common admin tasks, manage Google admin settings, and integrate with Google Workspace.
  • Reviewers appreciate BetterCloud's ability to automate workflows, manage Google admin settings, and its integration with Google Workspace, highlighting its ease of use, robust interface, and the time-saving benefits of its automation features.
  • Reviewers experienced issues with BetterCloud's high cost, complex setup, limited technical support, and a user interface that could be improved, particularly for the Google Administration module.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
29
Ease of Use
21
Onboarding
21
Features
18
Time-saving
18
Cons
Limited Features
15
Integration Issues
12
Limited Integrations
7
Poor Interface Design
7
Workflow Limitations
7
BetterCloud features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,260 Twitter followers
LinkedIn® Page
www.linkedin.com
217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Server Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Ease of Use
    1
    Identity Management
    1
    Implementation Ease
    1
    Reliability
    1
    Cons
    Access Issues
    2
    Authentication Issues
    1
    Login Issues
    1
    Notification Issues
    1
    Password Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Server Suite features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    5.8
    Approval Workflows
    Average: 8.7
    7.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Mid-Market
Delinea Server Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Ease of Use
1
Identity Management
1
Implementation Ease
1
Reliability
1
Cons
Access Issues
2
Authentication Issues
1
Login Issues
1
Notification Issues
1
Password Issues
1
Delinea Server Suite features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
5.8
Approval Workflows
Average: 8.7
7.5
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
797 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    261 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
9.4
Audit log
Average: 8.7
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,124 Twitter followers
LinkedIn® Page
www.linkedin.com
261 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pomerium is an open-source context-aware gateway for managing secure, identity aware access to applications and services. IT management teams can easily use Pomerium to provision access and ensure sec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pomerium Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Simple
    4
    Secure Access
    3
    Cloud Services
    2
    Customer Support
    2
    Cons
    Steep Learning Curve
    2
    Access Control
    1
    Difficult Learning
    1
    Difficult Learning Curve
    1
    Lacking Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pomerium features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    5.0
    Reporting
    Average: 8.7
    5.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pomerium
    HQ Location
    Los Angeles, US
    Twitter
    @pomerium_io
    281 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pomerium is an open-source context-aware gateway for managing secure, identity aware access to applications and services. IT management teams can easily use Pomerium to provision access and ensure sec

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 33% Mid-Market
Pomerium Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Simple
4
Secure Access
3
Cloud Services
2
Customer Support
2
Cons
Steep Learning Curve
2
Access Control
1
Difficult Learning
1
Difficult Learning Curve
1
Lacking Features
1
Pomerium features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
5.0
Reporting
Average: 8.7
5.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Seller
Pomerium
HQ Location
Los Angeles, US
Twitter
@pomerium_io
281 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(15)4.0 out of 5
View top Consulting Services for Oracle Cloud Infrastructure Identity and Access Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Define privileges for specific groups of users with simple, SQL-like policies

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Cloud Infrastructure Identity and Access Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Define privileges for specific groups of users with simple, SQL-like policies

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Oracle Cloud Infrastructure Identity and Access Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pathlock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Compliance Management
    2
    Customer Support
    2
    Features
    2
    Cons
    Confusing Interface
    1
    Confusing Terminology
    1
    Documentation
    1
    Error Handling
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pathlock features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    7.3
    Approval Workflows
    Average: 8.7
    7.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pathlock
    Company Website
    Year Founded
    2004
    HQ Location
    Dallas, US
    Twitter
    @pathlock
    306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    576 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Pathlock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Compliance Management
2
Customer Support
2
Features
2
Cons
Confusing Interface
1
Confusing Terminology
1
Documentation
1
Error Handling
1
Insufficient Information
1
Pathlock features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
7.3
Approval Workflows
Average: 8.7
7.9
Audit log
Average: 8.7
Seller Details
Seller
Pathlock
Company Website
Year Founded
2004
HQ Location
Dallas, US
Twitter
@pathlock
306 Twitter followers
LinkedIn® Page
www.linkedin.com
576 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every indiv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 93% Enterprise
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saviynt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    12
    Access Control
    7
    Customer Support
    6
    Management Ease
    6
    Cons
    Limited Features
    7
    Poor Customer Support
    7
    Missing Features
    6
    Lack of Features
    5
    Performance Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saviynt features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    9.2
    Approval Workflows
    Average: 8.7
    7.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Saviynt
    Company Website
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @saviynt
    1,187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every indiv

Users
No information available
Industries
No information available
Market Segment
  • 93% Enterprise
  • 7% Mid-Market
Saviynt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
12
Access Control
7
Customer Support
6
Management Ease
6
Cons
Limited Features
7
Poor Customer Support
7
Missing Features
6
Lack of Features
5
Performance Issues
5
Saviynt features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
9.2
Approval Workflows
Average: 8.7
7.9
Audit log
Average: 8.7
Seller Details
Seller
Saviynt
Company Website
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@saviynt
1,187 Twitter followers
LinkedIn® Page
www.linkedin.com
1,214 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veritas Netbackup Flex Appliance Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Secure Access
    4
    Access Management
    3
    Ease of Use
    3
    Customer Support
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Configuration
    2
    Difficult Learning
    2
    Difficult Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cohesity
    Year Founded
    2013
    HQ Location
    San Jose, CA
    Twitter
    @Cohesity
    29,651 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,404 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 31% Small-Business
Veritas Netbackup Flex Appliance Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Secure Access
4
Access Management
3
Ease of Use
3
Customer Support
2
Cons
Complexity
2
Complex Setup
2
Difficult Configuration
2
Difficult Learning
2
Difficult Learning Curve
2
Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Seller
Cohesity
Year Founded
2013
HQ Location
San Jose, CA
Twitter
@Cohesity
29,651 Twitter followers
LinkedIn® Page
www.linkedin.com
4,404 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 70% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Accops HyID features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    9.6
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, Maharastra
    Twitter
    @accopsinc
    226 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    298 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HyID enables strong multi-factor authentication based on One-Time-Password, Bio-metrics parameters validations, Device Hardware ID & PKI. HyID protects the corporate resources from unchecked acces

Users
No information available
Industries
No information available
Market Segment
  • 70% Mid-Market
  • 30% Enterprise
Accops HyID features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
9.6
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Pune, Maharastra
Twitter
@accopsinc
226 Twitter followers
LinkedIn® Page
www.linkedin.com
298 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dispel features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dispel
    Company Website
    Year Founded
    2014
    HQ Location
    Austin, TX
    Twitter
    @dispelhq
    722 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
Dispel features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Dispel
Company Website
Year Founded
2014
HQ Location
Austin, TX
Twitter
@dispelhq
722 Twitter followers
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    One Identity offers identity and access management solutions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Small-Business
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • One Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Management
    2
    Identity Management
    2
    Access Control
    1
    API Integration
    1
    Cons
    Complex Usability
    1
    Email Integration
    1
    Integration Issues
    1
    Learning Curve
    1
    Not User-Friendly
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • One Identity features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Aliso Viejo, CA
    Twitter
    @OneIdentity
    7,945 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    616 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

One Identity offers identity and access management solutions.

Users
No information available
Industries
No information available
Market Segment
  • 43% Small-Business
  • 29% Enterprise
One Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Management
2
Identity Management
2
Access Control
1
API Integration
1
Cons
Complex Usability
1
Email Integration
1
Integration Issues
1
Learning Curve
1
Not User-Friendly
1
One Identity features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
HQ Location
Aliso Viejo, CA
Twitter
@OneIdentity
7,945 Twitter followers
LinkedIn® Page
www.linkedin.com
616 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AutoElevate™ is a PAM solution that cost effectively allows you to remove local Admin rights and secure your clients with least privilege without frustrating your end users. With the AutoElevate Privi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AutoElevate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    Customer Support
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Poor Notifications
    1
    Setup Difficulty
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AutoElevate features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    9.6
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberFOX
    Year Founded
    2022
    HQ Location
    Tampa, FL
    Twitter
    @CyberFoxLLC
    144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AutoElevate™ is a PAM solution that cost effectively allows you to remove local Admin rights and secure your clients with least privilege without frustrating your end users. With the AutoElevate Privi

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
AutoElevate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
Customer Support
1
Easy Integrations
1
Implementation Ease
1
Cons
Poor Notifications
1
Setup Difficulty
1
Software Bugs
1
AutoElevate features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
9.6
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberFOX
Year Founded
2022
HQ Location
Tampa, FL
Twitter
@CyberFoxLLC
144 Twitter followers
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuous, automated account discovery protects privileged credentials at scale.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Identity features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuous, automated account discovery protects privileged credentials at scale.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BeyondTrust Privileged Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Security
1
Cons
This product has not yet received any negative sentiments.
BeyondTrust Privileged Identity features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. With Privilege Manager, you can prevent malware from e

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Privilege Manager features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. With Privilege Manager, you can prevent malware from e

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Delinea Privilege Manager features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
797 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ignimission Protec helps PAM managers gain total control over their CyberArk projects. Our solution accelerates CyberArk adoption and deployment, while increasing control over your PAM environment and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ignimission Protec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Customer Support
    1
    Ease of Use
    1
    Management Ease
    1
    Security
    1
    Cons
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ignimission Protec features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ignimission Protec helps PAM managers gain total control over their CyberArk projects. Our solution accelerates CyberArk adoption and deployment, while increasing control over your PAM environment and

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Ignimission Protec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Customer Support
1
Ease of Use
1
Management Ease
1
Security
1
Cons
UX Improvement
1
Ignimission Protec features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2011
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
(4)4.9 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sym is a secure access management tool that helps developers secure their production infrastructure & implement just-in-time access. Using Sym's SDKs, native integrations, and Slack app, teams are

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sym features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sym
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sym is a secure access management tool that helps developers secure their production infrastructure & implement just-in-time access. Using Sym's SDKs, native integrations, and Slack app, teams are

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Sym features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
Sym
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alibaba Cloud Resource Access Management (RAM) is an identity and access control service which enables you to centrally manage your users (including employees, systems or applications) and securely co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba Resource Access Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,059,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,580 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Alibaba Cloud Resource Access Management (RAM) is an identity and access control service which enables you to centrally manage your users (including employees, systems or applications) and securely co

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Mid-Market
Alibaba Resource Access Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,059,398 Twitter followers
LinkedIn® Page
www.linkedin.com
4,580 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devolutions Server is a self-hosted shared account and credential management solution designed to assist organizations in securely managing their sensitive information, such as passwords and access cr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Centralized Management
    1
    Password Management
    1
    Remote Access
    1
    Security
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Server features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devolutions Server is a self-hosted shared account and credential management solution designed to assist organizations in securely managing their sensitive information, such as passwords and access cr

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Devolutions Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Centralized Management
1
Password Management
1
Remote Access
1
Security
1
Cons
Expensive
1
Devolutions Server features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,218 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hitachi ID Privileged Access Manager features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Calgary, AB, Canada
    Twitter
    @OneBravura
    940 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
    Phone
    1-403-223-0740
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Hitachi ID Privileged Access Manager features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
1992
HQ Location
Calgary, AB, Canada
Twitter
@OneBravura
940 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
Phone
1-403-223-0740
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okera features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okera
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @okerainc
    395 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Enterprise
Okera features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
8.9
Audit log
Average: 8.7
Seller Details
Seller
Okera
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@okerainc
395 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 67% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Identity and Access Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 67% Enterprise
OpenText Identity and Access Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

    Users
    No information available
    Industries
    • Primary/Secondary Education
    Market Segment
    • 50% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RapidIdentity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    6.7
    Approval Workflows
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Houston, US
    Twitter
    @identityauto
    614 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

Users
No information available
Industries
  • Primary/Secondary Education
Market Segment
  • 50% Enterprise
  • 30% Mid-Market
RapidIdentity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
6.7
Approval Workflows
Average: 8.7
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Houston, US
Twitter
@identityauto
614 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure compute is an on-demand computing service for running cloud-based applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Enterprise
    • 42% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Compute features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure compute is an on-demand computing service for running cloud-based applications.

Users
No information available
Industries
No information available
Market Segment
  • 42% Enterprise
  • 42% Small-Business
Azure Compute features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • EmpowerID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Authentication
    1
    Cloud Services
    1
    Customer Support
    1
    Device Management
    1
    Cons
    Difficult Integration
    1
    Error Handling
    1
    Integration Difficulty
    1
    Integration Issues
    1
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EmpowerID features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    EmpowerID
    Year Founded
    2005
    HQ Location
    Dublin, Ohio
    Twitter
    @EmpowerID
    387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
EmpowerID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Authentication
1
Cloud Services
1
Customer Support
1
Device Management
1
Cons
Difficult Integration
1
Error Handling
1
Integration Difficulty
1
Integration Issues
1
Needs Improvement
1
EmpowerID features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
EmpowerID
Year Founded
2005
HQ Location
Dublin, Ohio
Twitter
@EmpowerID
387 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReShield is an advanced Identity and Access Governance solution designed for companies looking to seamlessly secure and manage access to their critical data and infrastructure. It simplifies identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReShield features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ReShield
    Year Founded
    2023
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReShield is an advanced Identity and Access Governance solution designed for companies looking to seamlessly secure and manage access to their critical data and infrastructure. It simplifies identity

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReShield features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
ReShield
Year Founded
2023
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Newark, Delaware
    LinkedIn® Page
    www.linkedin.com
    109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Newark, Delaware
LinkedIn® Page
www.linkedin.com
109 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Reporting
    Average: 8.7
    6.7
    Approval Workflows
    Average: 8.7
    5.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smallstep
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @smallsteplabs
    1,532 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Reporting
Average: 8.7
6.7
Approval Workflows
Average: 8.7
5.8
Audit log
Average: 8.7
Seller Details
Seller
Smallstep
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@smallsteplabs
1,532 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
    Limited Features
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    0.0
    No information available
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
Limited Features
1
Limited OS Compatibility
1
UserLock features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
0.0
No information available
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 2AB iLock Security Services features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    2AB
    Year Founded
    1997
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
2AB iLock Security Services features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
2AB
Year Founded
1997
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adaptive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Automation
    1
    Customization Features
    1
    Data Protection
    1
    Ease
    1
    Cons
    Data Privacy
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Automation
1
Customization Features
1
Data Protection
1
Ease
1
Cons
Data Privacy
1
Expensive
1
Adaptive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthNull Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    MFA Security
    1
    Security
    1
    Cons
    Lack of Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthNull features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authnull
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthNull Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
MFA Security
1
Security
1
Cons
Lack of Features
1
AuthNull features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Authnull
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Core Access Insight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Core Access Insight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Core Access Insight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Poor Customer Support
1
Core Access Insight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyberelements features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Systancia
    Year Founded
    1998
    HQ Location
    Sausheim, FR
    Twitter
    @Systancia
    751 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
cyberelements features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Systancia
Year Founded
1998
HQ Location
Sausheim, FR
Twitter
@Systancia
751 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Formal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Admin Control
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Formal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Formal
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Formal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Admin Control
1
Security
1
Cons
This product has not yet received any negative sentiments.
Formal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Formal
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
(1)4.5 out of 5
View top Consulting Services for Krontech Single Connect Privileged Session Manager
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Istanbul, TR
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
2007
HQ Location
Istanbul, TR
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine PAM360 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ManageEngine PAM360 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • One Identity Safeguard features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,410 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,665 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
One Identity Safeguard features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,410 Twitter followers
LinkedIn® Page
www.linkedin.com
3,665 employees on LinkedIn®
Ownership
NYSE: DGX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • P0 Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Ease of Use
    1
    Features
    1
    Policy Management
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • P0 Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Francisco, CA
    Twitter
    @P0Security
    50 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
P0 Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Ease of Use
1
Features
1
Policy Management
1
Security
1
Cons
This product has not yet received any negative sentiments.
P0 Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2022
HQ Location
San Francisco, CA
Twitter
@P0Security
50 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Mineola, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
HQ Location
Mineola, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Privileged Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    27 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    454 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, de

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Privileged Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
27 Twitter followers
LinkedIn® Page
www.linkedin.com
454 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QGuard is the leading Privileged Access Management (PAM) solution for Managed Service Providers (MSPs). Designed with a security-first mentality, and the goal to proactively mitigate risk and suppor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • QGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Use
    1
    Integrations
    1
    Onboarding
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QGuard features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberQP
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

QGuard is the leading Privileged Access Management (PAM) solution for Managed Service Providers (MSPs). Designed with a security-first mentality, and the goal to proactively mitigate risk and suppor

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
QGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Use
1
Integrations
1
Onboarding
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
QGuard features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Audit log
Average: 8.7
Seller Details
Seller
CyberQP
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission-based system for a smooth employee experience. Discover a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securden Endpoint Privilege Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Newark, Delaware
    LinkedIn® Page
    www.linkedin.com
    109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission-based system for a smooth employee experience. Discover a

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Securden Endpoint Privilege Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Newark, Delaware
LinkedIn® Page
www.linkedin.com
109 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    System Frontier is like a proxy server for admin rights. It enables organizations to empower IT support staff with delegated, fine-grained permissions to manage systems and execute automation tasks. U

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • System Frontier features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Noxigen
    HQ Location
    Nashville, TN
    Twitter
    @Noxigen
    320 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

System Frontier is like a proxy server for admin rights. It enables organizations to empower IT support staff with delegated, fine-grained permissions to manage systems and execute automation tasks. U

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
System Frontier features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Noxigen
HQ Location
Nashville, TN
Twitter
@Noxigen
320 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trustle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Identity Management
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustle features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustle
    Year Founded
    2019
    HQ Location
    Walnut Creek, CA
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Trustle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Identity Management
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Trustle features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Seller
Trustle
Year Founded
2019
HQ Location
Walnut Creek, CA
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    3Edges is a Relationship-based Dynamic Authorization tool that authorizes access based on relationships between subjects, objects and actions. Done with graph database technology, 3Edges provides Auth

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 3Edges features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    3Edges
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

3Edges is a Relationship-based Dynamic Authorization tool that authorizes access based on relationships between subjects, objects and actions. Done with graph database technology, 3Edges provides Auth

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
3Edges features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
3Edges
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Access Director is an access management software that removes local administrative privileges.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Access Director features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Access Director is an access management software that removes local administrative privileges.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Access Director features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AccessMatrix Universal Access Management (UAM) is a comprehensive web single sign-on (SSO), web access management, federated single sign-on (SSO), externalized authorization management, and hierarchy-

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AccessMatrix Universal Access Management (UAM) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Singapore, Singapore
    Twitter
    @iSprintInnov
    141 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
    Phone
    65 6244 3900
Product Description
How are these determined?Information
This description is provided by the seller.

AccessMatrix Universal Access Management (UAM) is a comprehensive web single sign-on (SSO), web access management, federated single sign-on (SSO), externalized authorization management, and hierarchy-

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AccessMatrix Universal Access Management (UAM) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
Singapore, Singapore
Twitter
@iSprintInnov
141 Twitter followers
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
Phone
65 6244 3900
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application Control Plus (ACP) is an enterprise solution that leverages application control and endpoint privilege management features to fortify security. By enabling application discovery, rule-base

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Application Control Plus features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Application Control Plus (ACP) is an enterprise solution that leverages application control and endpoint privilege management features to fortify security. By enabling application discovery, rule-base

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Application Control Plus features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BastionZero is a Zero Trust access platform for infrastructure, offering passwordless access to various resources like servers and Kubernetes, paired with Identity Providers (IdP) for policy-based acc

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BastionZero features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Boston, Massachusetts
    Twitter
    @getBastionZero
    418 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

BastionZero is a Zero Trust access platform for infrastructure, offering passwordless access to various resources like servers and Kubernetes, paired with Identity Providers (IdP) for policy-based acc

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BastionZero features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
HQ Location
Boston, Massachusetts
Twitter
@getBastionZero
418 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DevOps Secrets Safe enables enterprise teams to secure and manage credentials and other secrets used in their continuous integration and continuous delivery (CI/CD) toolchain, applications, and other

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust DevOps Secrets Safe features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DevOps Secrets Safe enables enterprise teams to secure and manage credentials and other secrets used in their continuous integration and continuous delivery (CI/CD) toolchain, applications, and other

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BeyondTrust DevOps Secrets Safe features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    bi-Cube IAM is an identity management software that provides an intelligent middleware with interfaces of different system integration and powerful administration tools.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • bi-Cube IPM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

bi-Cube IAM is an identity management software that provides an intelligent middleware with interfaces of different system integration and powerful administration tools.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
bi-Cube IPM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The IAM solution that lets employees securely access devices and applications without compromising ease of use or requiring heavy IT infrastructure

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bluink Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bluink
    Year Founded
    2010
    HQ Location
    Ottawa, CA
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The IAM solution that lets employees securely access devices and applications without compromising ease of use or requiring heavy IT infrastructure

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Bluink Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Bluink
Year Founded
2010
HQ Location
Ottawa, CA
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Border0 is the world’s first application-aware VPN, combining the familiarity of a VPN with the granular control and intelligence of Privileged Access Management (PAM), specifically designed for engin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Border0: The World's First Application-Aware VPN features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Border0
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Border0 is the world’s first application-aware VPN, combining the familiarity of a VPN with the granular control and intelligence of Privileged Access Management (PAM), specifically designed for engin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Border0: The World's First Application-Aware VPN features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Border0
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brainwave GRC is a leading software vendor focused on IAI (Identity Analytics and intelligence). Our mission is to help businesses to fight against fraud, data leakage and cyber risks, by using innova

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brainwave GRC features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Brainwave GRC is a leading software vendor focused on IAI (Identity Analytics and intelligence). Our mission is to help businesses to fight against fraud, data leakage and cyber risks, by using innova

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Brainwave GRC features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Britive is an access management and policy enforcement solution for all your cloud infrastructure and platform services. Cloud native and integrates with all major IaaS, PaaS, SaaS & DaaS platform

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Britive Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Britive
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Britive is an access management and policy enforcement solution for all your cloud infrastructure and platform services. Cloud native and integrates with all major IaaS, PaaS, SaaS & DaaS platform

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Britive Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Britive
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CapaOne is CapaSystems’ cloud-based platform focusing on all the daily IT disciplines that MUST be handled at ALL endpoints – without you necessarily having to be an expert in them all. CapaOne suppor

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CapaOne features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Denmark
    LinkedIn® Page
    linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CapaOne is CapaSystems’ cloud-based platform focusing on all the daily IT disciplines that MUST be handled at ALL endpoints – without you necessarily having to be an expert in them all. CapaOne suppor

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CapaOne features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1997
HQ Location
Denmark
LinkedIn® Page
linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CA Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CA Trusted Access Manager for Z features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

CA Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CA Trusted Access Manager for Z features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simple End-to-End Encrypted Cloud ENV Variables. Keep your ENV vars synced and versioned with your team (without Git). Simple CLI – Get started in seconds, not minutes. Trusted IP Addresses let you re

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudEnv features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudEnv
    Year Founded
    2020
    HQ Location
    San Diego, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simple End-to-End Encrypted Cloud ENV Variables. Keep your ENV vars synced and versioned with your team (without Git). Simple CLI – Get started in seconds, not minutes. Trusted IP Addresses let you re

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CloudEnv features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudEnv
Year Founded
2020
HQ Location
San Diego, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devolutions privileged access management (PAM) is an essential security platform designed to control, monitor, and secure elevated access for users, accounts, processes, and systems across your organi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions PAM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devolutions privileged access management (PAM) is an essential security platform designed to control, monitor, and secure elevated access for users, accounts, processes, and systems across your organi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Devolutions PAM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,218 Twitter followers
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged accounts are both a necessity and a liability. These accounts, with their nearly-unlimited access to system resources are essential for everyday IT operations, yet abuse of privileged accou

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EmpowerID Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    EmpowerID
    Year Founded
    2005
    HQ Location
    Dublin, Ohio
    Twitter
    @EmpowerID
    387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged accounts are both a necessity and a liability. These accounts, with their nearly-unlimited access to system resources are essential for everyday IT operations, yet abuse of privileged accou

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EmpowerID Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
EmpowerID
Year Founded
2005
HQ Location
Dublin, Ohio
Twitter
@EmpowerID
387 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    vo Security is a multi-tenant Identity and Access Management (IAM) platform built exclusively for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs). Headquartered in Aust

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evo Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Austin, US
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

vo Security is a multi-tenant Identity and Access Management (IAM) platform built exclusively for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs). Headquartered in Aust

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Evo Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Austin, US
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®

Learn More About Privileged Access Management (PAM) Software

What is Privileged Access Management Software?

When managing user accounts, companies should set a clear divide between customer-generated accounts and internal ones. The benefit of doing this is twofold. First, customer accounts and internal users have vastly different needs and requirements for your business. Second, compartmentalization helps prevent cross-contamination. More simply, if something goes wrong in your customer account management system, it won’t affect your internal account management system or vice versa.

Thankfully, different management systems exist specifically to focus on customer account management and internal accounts. While customer identity and access management (CIAM) software is built for handling your business’ customer-facing accounts and account security, privileged access management (PAM) software focuses on managing and securing your business’ own internal user accounts. PAM solutions also differ in a drastic way from CIAM solutions by dealing with access to critical systems (e.g., databases, servers, domains, and networks) as well as handling IT admin accounts.

Key Benefits of Privileged Access Management Software

  • Manage employee access privileges to key business systems
  • Centralize storage of employee information
  • Monitor employee behavior, web-based threats, and unapproved internal actors
  • Customize access privileges for users
  • Monitor employee account behavior

Why Use Privileged Access Management Software?

There are many security benefits to PAM solutions. Older methods of key sharing and word-of-mouth communication are not sufficient in protecting information and business-critical systems. These tools will help security professionals and administrative personnel better track who in their organization has access to what and may document their actions or behaviors within privileged systems or applications.

Security — Privileged access management tools centralize the storage credentials and administration of access. Without IAM tools, this data can be more vulnerable to threats if it is not properly safeguarded. IAM tools are fortified with authentication features to limit viewing to only those administrators with granted access. These tools will also provide alerts for potential threats or users who have accessed sensitive data without permission.

Administration — Administrators can create databases, document user account histories, and view approved privileges, all of which helps to simplify the onboarding process. Administrators can quickly create new accounts and approve applications for new users to access. Some products even offer templates to have ready when adding employees to specific roles. The same goes for those no longer employed; administrators can quickly restrict their privileges or delete their account.

Cloud application management — Many cloud applications have the ability to connect dozens of applications, user credentials, and access privileges. Large, enterprise-sized companies will benefit greatly from having a cloud-based database that securely contains this sensitive data. Many products come with prebuilt integrations for hundreds of applications, while others may require customization or simply offer a limited variety of applications.

Who Uses Privileged Access Management Software?

Administrative professionals — Administrators—typically security administrators—will most often be the ones using privileged access management solutions. Other system admins may find use in PAM solutions as well, since certain roles may need more or less access to different business systems, pending their role.

Service providers — Third-party service providers will often manage cloud services directly and may need to integrate with other business systems or networks. Privileged access management tools allow for role-based access control to limit what information and systems can be accessed by third-party services providers or other external entities requiring access to sensitive information or business-critical systems.

Human resources — HR professionals may use privileged access management solutions to delegate access to internal employees or new hires during the onboarding process. Many PAM tools integrate with directory services and identity servers and other identity management solutions to integrate identity information and simplify privileged account management. These accounts may be set up for access to applications, cloud services, databases, or any other IT system requiring privileged access.

Internal employees — These are the end users accessing applications and networks by the allowance of administrative or security staff. These individuals may only interact with the PAM solution in that they use the credentials to access information. But some tools may provide a dashboard or access portal with information about what applications, networks, services, and databases they have been approved to access.

Privileged Access Management Software Features

These are a few common features of privileged access management software.

Local access — Local access functionality facilitates administrative access to on-premises systems, legacy applications, web-based applications, network resources, and servers.

Multi-factor authentication (MFA) — MFA or 2FA functionality adds a supplementary level of security for systems by requiring SMS codes, security questions, or other verification methods before granting access.

Bulk changes — Bulk change functionality can simplify the administration, federation, and identity governance of individuals in large amounts through batch update capabilities.

Self-service access requests — Self-service features allow users to request access to applications, networks, or databases, automatically provisioning individuals if they meet policy requirements.

Partner access — Local access functionality facilitates administrative access to users who are not company employees but are either within the company’s local area network or outside the network.

BYOD support — Bring-your-own-device (BYOD) features enable users to use their own device(s) to access company applications.

Bidirectional profile synchronization — Synchronization keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application.

Policy management — This feature enables administrators to create access requirements and standards while applying policy controls throughout request and provisioning processes.

Role management — Role management features help administrators establish roles that provide authentication and access rights for each user in the role.

Approval workflows — Process and approval workflows allow business stakeholders and administrators to approve or reject requested changes to access via a defined workflow.

Compliance audits — Auditing features allow for standards and policies to be established while proactively auditing access rights against predefined requirements.

Smart provisioning — Self-learning or automated provisioning helps to reduce the amount of manual work associated with creating access rights, as well as managing changes and removals for on-premises and cloud-based applications.

Potential Issues with Privileged Access Management Software

Security — Security is always a concern, especially with technologies specialized in protecting sensitive information. Individuals should be sure the administration of PAM software is controlled only by trusted individuals. Integrations with cloud services should be secure, and businesses should read the fine print on service provider contracts to ensure their security standards are sufficient. Without proper security protocols in place, systems may be vulnerable to data breaches, privilege escalation, and dozens of other web-based threats from both internal and external actors.

Compliance requirements — New compliance requirements are emerging across the globe. As this occurs, it’s important to remain adaptable in planning to secure, store, and deliver sensitive information in compliance with international regulations. Compliance management features will help to audit identity stores and servers to ensure each person is properly documented and their sensitive data is stored securely. Compliance auditing tools are also great add-ons for ad-hoc compliance checks and can be helpful in general to ensure a well-rounded security system is in place.

Device compatibility — End-user devices pose potential security risks if they are not compatible with identity management tools. They also pose a threat if they are not properly updated, patched, and protected in general. Device compatibility, support for servers, virtual environments and any other system requiring privileged access should be documented and integrated with systems to ensure every device is properly protected.