Privileged Access Management Features

Read what people say are the most valuable features of the solutions they use.
ReviewerCk326 says in a CA Privileged Access Manager review
Senior Consultant at a comms service provider with 10,001+ employees
The password manager is a valuable feature. It saves time for the user. The users do not have to remember the password or change the password. It is a user-friendly solution. View full review »
reviewer990891 says in a CyberArk PAS review
Information Technology Specialist (Contract role) at a tech services company with 10,001+ employees
* OTP * Session recording * Auditing * It takes away all ambiguity around "known" admin accounts. View full review »
Head of Information Security & Risk Assurance at a financial services firm with 501-1,000 employees
The best part of this product is the administrator convenience. The portal is very user-friendly. An administrator can use it very easily. This is the most important part of any privileged or anti-management solution. If it is not user-friendly an administrator will not want to use it. It has to be very user friendly and easy to use. What is a good feature here, just insert whatever target that you want access, then click next, and you will be in the system. I would suggest this should be the most prominent feature for any of the privileged or anti-management system. What I like on this product: It is very easy, user-friendly, and an administrator can access it at any point in time without any hassle. View full review »
Consultant at a financial services firm with 10,001+ employees
Once logged into our kiosk, I can go to 10 different servers and everything is logged. We can use this to identify which user is logged in, because the login being using to connect to servers will be a common ID, and that ID will not tell you who is the person logged in is. With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds. Another feature is the password can be changed automatically. For example, if you have a 60 day password change policy, your cards will change the password on its own and keep it within the system. View full review »
IT Security Mananger
Video capture. View full review »
Information Security at ITG
Whoever built it from the ground up, they understand how an organization is laid out. You can tell. When a user comes in, it automatically picks up their information. It is very easy to use. The interface is very friendly, colorful, and bold. I really like that. It is friendly to the users. View full review »
Rodney Dapilmoto says in a CyberArk PAS review
Systems Admin Analyst 3 at CPS Energy
The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task. Using the PSMP (Privileged Session Manager Proxy) makes it extremely convenient for UNIX Administrators to utilize their favorite SSH client software (i.e. SecureCRT or Putty) to connect to a privileged target without having to go through the PVWA web login. View full review »
Head of Communications at Stadt Winterthur
The most valuable feature is that this solution can be implemented regardless of the operating system. It can be used with Microsoft, Linux, Unix, and Cisco, and we can use the same product to access every different service. This solution is simple to use. View full review »
Solution Architect at a tech services company with 51-200 employees
The most valuable feature of this solution is that it is easy to use. This product is very stable. View full review »
Technical Manager at Gulf IT
I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things that the customers are worried about when they talk about session recording. The other valuable feature is out-of-box connectors. BeyondTrust has partnered with many well-known companies. Other PAM products are not there yet. The number of out-of-box connectors BeyondTrust has is really good. View full review »
reviewer1081059 says in an One Identity Safeguard review
IT Security Consultant at a tech services company with 11-50 employees
The solution's most valuable features are the efficiency and the quality of the recording. View full review »
reviewer1216335 says in an One Identity Safeguard review
Security Engineer at a tech services company with 201-500 employees
The way the solution is installed and deployed is very valuable. They make it very easy. The two-factor identification is very good. For the web portal, you need to implement a jump sever. It's not a native HTML protocol. This is probably one of the most important features in the solution. View full review »
Andrei Bigdan says in a WALLIX BASTION review
Executive Manager at B2B-Solutions LLC
This solution allows me to have an agent event though it's agentless. I use the proxy approach. Some solutions are divided into proxy or agent-based. This solution is agentless, it's by proxy. I'm able to use something like an agent that is encapsulated into this version. It's similar to allowing for hybrid technology. There's no agent, but something like an agent can be launched from the surface. The newest model can do great things. It can hide passwords, for example. The Password Manager also allows for password retrieval for encrypted passwords. Even if the Password Manager goes down, with a Jiffy Key, a person can retrieve all of their passwords and have them sent to their email. There is also an Access Manager, which no other solution offers. Each web console can gain access through several PAMs. They need to just open the web browser and everything they need is the browser. They do their work right in the browser window. The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning. View full review »
reviewer1161345 says in an One Identity Safeguard review
User with 10,001+ employees
The most valuable feature is auditing the sessions. All of the sessions (RDP, SSH, Citrix) can be audited and replayed on demand. Complete indexing on SSH sessions means that all commands are searchable after indexing. View full review »
Bohumil Glac says in a Thycotic Secret Server review
Analytické a bezpečnostní nástroje IBM with 201-500 employees
The features that we have found the most valuable are: * Automatic password rotation to manage the security keys. * Alerting of abnormal use of credentials. * Dramatically improving our security posture. * Facilitating compliance with our safety standards. * Multiple layers of security and access management for IT admins, robust segregation of role-based duties, and military-grade AES 256 bit encryption. * Database clustering, load balancing, and unlimited admin mode. * Out-of-the-box & custom reports. View full review »
Sergey Smirkin says in an One Identity Safeguard review
Head of Information Security at a financial services firm
The majority of the features offered with this solution are the same as with other similar systems. The most unique and valuable features are the upstream and downstream throughput capacities; the Safeguard platform provides agile integration. In actuality, all the features are valuable. They're good and user-friendly. View full review »
Stephen Fleming-Unger says in an One Identity Safeguard review
Security Consultant at Controlware GmbH
There are a variety of protocols that it supports. The video-like stream and audit capabilities, in combination with its indexing capabilities to search for critical events quickly, are valuable features. The transparent mode for privileged sessions is really nice because it keeps the integration quite smooth. Also, users don't have to change the way that they currently are used to working. It is easy to manage. There is a very logical, clear user interface. Also, the integration of scripts is thoughtfully implemented. Overall, it's a nice product to manage. View full review »
Cedric Jolivet says in an One Identity Safeguard review
Identity & Access Manager at Reist Telecom Gmbh
* Acting as a proxy * Session encryption * Flexibility of usage The transparent mode for privileged sessions is one of the best thing for customers, because they don't see the system in-between. Thus, it is transparent for them. The system is easy to manage, as it is not a system that you will change everything all of a sudden. It evolves most of the time with customer requests. View full review »
HeadOfDed6dc says in an One Identity Safeguard review
Head of Department at a financial services firm with 10,001+ employees
One of the most valuable features is that it supports the Linux operating system. Also, the transparent mode for privileged sessions is a very good solution. View full review »
IdmArchi90fa says in an One Identity Safeguard review
IDM Architect at a tech company with 10,001+ employees
The extensible framework for authentication is one of the most valuable features. We use an MFA plug-in and a lot of different factors, depending on what the business use-cases are. And of course, the auditing functionality is also valuable. We have also found the solution to be extensible through cloud-delivered services. It's worked out well. The SPS instances we use are located on-premise, but we can still utilize them to access resources in the cloud. That's not a problem. We haven't deployed any SPS itself in the cloud, but it works fine for our cloud environments. View full review »
Senior Consultant (e-Governance) Leveraging ICT for Growth, Employment and Governance with 201-500 employees
* Auto-discovery * Access control * Privilege management * Security controls * Identity discovery * Usage of privileged accounts * Time of sessions and monitoring of sessions. View full review »
reviewer1052523 says in a CyberArk PAS review
User with 10,001+ employees
Automatic password management based on a strong password policy. Because still, many people choose not strong enough passwords for administrative accounts. View full review »
Student9846 says in a Thycotic Secret Server review
IT Strategy Consultant with 201-500 employees
The ability to give some groups access to different kinds of databases with the storage of a password is the most valuable feature. View full review »
Manager70c3 says in a Thycotic Secret Server review
Manager at a consultancy with 1,001-5,000 employees
The most valuable feature of this solution is the random changing of passwords. View full review »
ProductSfdcf says in a Thycotic Secret Server review
Product Security Engineer
* The overall secrets management * The ability to control access by groups * Sharing secrets View full review »
Sign Up with Email