Popular Comparisons Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too.
The technical support for this solution is very good. If I was to rate it on a scale of one to five, I would give it a five.
Popular Comparisons Being able to use a proxy server is an advantage.
It is generally easy-to-use and install.
Popular Comparisons There has been no downtime this year.
It is able to manage storage and use of personal passwords.
Popular Comparisons What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy.
Popular Comparisons 100% compliant and you don't have to maintain ID management for each and every user.
The initial setup is very straightforward. It's not complex at all.
Popular Comparisons Its video recording capabilities have definitely been key for us.
The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning.
Popular Comparisons We are convinced that Fudo PAM is better than competing products like WALLIX.
it's perfect to control and administer computers in our company.
Popular Comparisons The most valuable feature of this solution is that it is easy to use.
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: March 2021.
474,595 professionals have used our research since 2012.
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
474,595 professionals have used our research since 2012.
See all 31 solutions in Privileged Access Management
Advice From The Community
Read answers to top Privileged Access Management questions. 474,595 professionals have gotten help from our community of experts.![]() | Simone Antonaci User at 2Five1 |
Kindly advise on the top 5 solutions within the industry to look at.
See all 4 answers »
![]() | Oluwatosin Soyoye User at Union Bank PLC |
My Bank is currently looking at PAM Solutions.
Kindly advise on the top 5 solutions within the industry that can be looked at. We would like to engage from the OEM point of view to have a POC carried out before we make any commercial engagement.
![]() | Menachem D Pritzker Director of Growth at IT Central Station |
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.
Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.
The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.
How could Twitter have been better prepared for this? How do you rate their response?
![]() | Paresh Makwana Director at a tech services company |
I am a director of a small tech services company.
How do you think AI and ML will help or work with Privileged Identity Management (PIM) and Privileged Access Management (PAM)?
What is Privileged Access Management?
Privileged Access Management (PAM) oversees requirements of critical, private accounts living in an enterprise’s IT infrastructure. It is alternatively called Privileged Identity Management (PIM), Privileged Account Management or Privileged Session Management – collectively known as PxM. A privileged user is a person who can access the administrative backend of a critical system, delete data or change settings. PAM is essential to strong security.
The Privileged Access Management process is normally used as a tool for information security, and IT Central Station users look for richness in the functionality provided for oversight. Enterprises must prevent unauthorized backend system access while always adhering to compliance. Privileged Access Management safeguards aggressive data breaches and is intended to protect confidential data from the efforts of bad actors. PAM is constantly being updated to protect the security of the enterprise IT Central Station users are responsible for controlling shared frameworks and monitor authorized user access along with interim levels of permissions for privileged access within an enterprise.
IT and DevOps teams look for a number of categories necessary for Privileged Access Management, sometimes referred to as a “PAM Solution.” Requirements include life cycle and provisioning management, authorization, authentication, password management, access controls and auditing. Operating system components such as routers, switches, and firewalls all come into question with Privileged Access Management.
Functionality must meet risk management and compliance parameters. The goal is to protect, control and monitor operating systems, applications and the database. This can be achieved in part through session recording and session isolation to prevent unauthorized access, always a concern whether IT is talking about on-premises or cloud solution.
IT professionals are looking for easy to use GUI, availability of OOTB integration functionalities with other systems and availability of OOTB connectors to manage password and sessions of devices. High availability / failover to DR environment with no data loss should be provided and scalable components are key. Time is always a factor, so having the agility and ability to establish and manage simultaneous operating sessions to target devices is ideal. Ultimately, speed, coverage and security are the best ways to keep out the bad guys.
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: March 2021.
474,595 professionals have used our research since 2012.
Hi Simone,
Following are the products which you can look for your requirement. I recommend to select any solutions depend on the your organization need. Is it needed on premise or on cloud. Do you need SAAS service or have in house deployment. On these conditions cost will differ. My personal opinion is
CyberArk,
Thycotic,
Wallix
Beyondtrust
Microsoft Azure AD Premium
Thanks,
Kishan
When It comes to PAM, I would say Thycotic, CyberArk, BeyondTrust are the ones I normally include in RFPs. However, where your environment is exclusively Azure cloud-based, I say that Microsoft's Azure AD Premium provides a pretty good PIM solution. These are different solutions to achieve the same goal of managing privileged access.
I would first state that you are asking an unqualified question. The PAM tool that matches your organizations requirements, use cases, volume, and many other considerations, will need to be considered in this equation. I like the previous answer by Kishan as I like those products and see them employed successfully. The converse is also true if not carefully scoped and evaluated.
PAM tools can be costly and contain confounding arrays of security features and terminology synchronization will be key in ensuring you are getting what you actually are asking for. On top of the software cost implications you will have the Architectural, Implementation, and Administration costs nipping at your heels. Consider also that this is not a "PAM Project", but a long term Program and buy-off must start from the very top of your organization.
I have witnessed, and participated, in projects that started out with your question, and many went off the rails, unless important considerations are taken into account:
1. Define your requirements with granularity, including integration with your existing infrastructure such as: Authentication / Authorization / MFA, syslog, analytics, Disaster Recovery and High Availability just to name a few.
2.Determine your overall goals relating to Least Privilege, Standing Privilege, Just in time Privilege, and No standing privilege. Do you require Session Recording and Keystroke Logging, as they are not always bundled into the initial price and sometimes not together, and may be individual features in your initial quotations and can unpleasantly surprise you.
3. Provision a comprehensive test environment to confirm the viability of the product choices within your infrastructure.
4. Select a vendor or integration partner to back-fill the expertise gaps in your organization as these skill-sets are very expensive and marketable.
I apologize for not answering your question directly, but I would consider looking into the Gartner resources, KuppingerCole and so on.
In a short direct answer I favor CyberArk, BeyondTrust, Thycotic, Centrify, and StealthBits, and these are definitely not in any preferential order.
Hi Simone,
When we started the PAM journey we POC'ed three vendors based on the use cases and the roadmap for your requirements. Since the world is shifting to cloud infrastructure, i would recommend looking at these vendors.
One Identity (Safe Guard), CyberArk, and Beyondtrust. We decided to go with One Identity because it was the right fit for our use cases and requirements. We have been using safe guard for several years and it did not disappoint so far! Rock Solid tool.