Symantec Privileged Access Manager Review

Monitoring privileged users’ actions is valuable because of the possible impact of an insider breach incident.

What is most valuable?

Monitoring privileged users’ actions is valuable because of the high level of trust and wide-ranging access insiders typically enjoy. The impact of an insider breach incident can be quite high.

How has it helped my organization?

  • Integrates your management

What needs improvement?

Customers want simultaneous monitoring of users’ actions, so a manager can block the session immediately in case of a user violation.

For how long have I used the solution?

I have used it for six years.

What do I think about the stability of the solution?

We had some issues with the load balancing feature when configured for clustering.

What do I think about the scalability of the solution?

We have not encountered any scalability issues.

How are customer service and technical support?

Technical support is average.

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

Initial setup was simple because of the rule-based configuration.

What's my experience with pricing, setup cost, and licensing?

Reduce the price by subdividing the license bundle.

Which other solutions did I evaluate?

Before choosing this product, we did not evaluate other options.

What other advice do I have?

It is the best solution for managing privileged users.

**Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
More Symantec Privileged Access Manager reviews from users
Find out what your peers are saying about Broadcom, CyberArk, BeyondTrust and others in Privileged Access Management (PAM). Updated: August 2021.
534,226 professionals have used our research since 2012.
Add a Comment
ITCS user