CA Privileged Access Manager Reviews

3.9 out of 5 stars
 (41)
Anonymous avatar x80
Real User
Cloud SME
May 08 2017

What is most valuable?

When you look at the whole PAM itself, session manager is very important. It records what happens. Access manager and credential manager are very important as well. Those are the key things. Session manager, access manager, and credential... more»

How has it helped my organization?

On the access management side, our system administrators, under privileged management, don't have to use their local tools to log on to the production servers. They basically will log on, but they need access controls. They log on to a web... more»

What needs improvement?

When we look at CA PAM, the multi-tenant deployment is definitely an improvement that we want to see. They don't offer multi-tenancy. If I have an enterprise, or if I am an MSP and I would like use an instantiation of CA PAM for multiple... more»
Anonymous avatar x80
Real User
Senior Solutions Architect, at a tech services company with 1,001-5,000 employees
Oct 07 2016

What is most valuable?

* Ease of use. * The way in which it can learn about the connectivity to systems, e.g., VMware vCenter Console; it can wrap that into its internal Java-based shell. Therefore, one does not need a terminal server solution. * The non-Java based... more»

How has it helped my organization?

We only did an evaluation of the product, but we do feel that it will improve our security and governance posture and shave time off our engineers having to connect to systems managed by the PAM solution. It also gives us the accountability... more»

What needs improvement?

* Reporting is very limited. * Online Help is not detailed enough. * Canned reports provided results for all targets and cannot simply be run for a particular customer when used in a service provider environment; one has to create some custom... more»
Privileged identity management report from it central station 2018 03 31 thumbnail
Find out what your peers are saying about CA Technologies, CyberArk, Quest Software and others in Privileged Identity Management.
265,117 professionals have used our research since 2012.
Ce6f674c f2a6 4b7a abd1 6b7f133f8a5f avatar
Real User
Security Engineer at EarthLink
Dec 16 2016

What is most valuable?

With CA PAM, it's mainly the vaulting of credentials that we're looking for, and then after that, probably the bastion functionality where we force all of our administrators through that to get to the servers. We'll also do session recording... more»

How has it helped my organization?

It definitely helps with security. It also helps with how we audit which credentials are being used. When somebody actually logs in to CA PAM, they have to go in through second factor authentication. Once they're logged in, whatever... more»

What needs improvement?

A better discovery interface of accounts. It does do discovery of accounts for Windows servers, and you could do UNIX servers as well, but it's kind of clunky how it does it.
56b501cf 3896 45a2 862a 56d260b90e2e avatar
Consultant
CIO/Management Consultant at a tech company with 51-200 employees
Oct 10 2016

What is most valuable?

The CA PAM’s ability to seamlessly integrate and provide a demarcation between users and systems is the most attractive aspect. It: * Enables all control to start with Xsuite’s Deny All, Permit by Exception (DAPE) approach to limit privilege... more»

How has it helped my organization?

In retrospect, we and our clients have seen a reduction in service-related issues for application server and mainframe environments, a reduction in the provisioning lifecycle and requirements for systems such as mainframes, and a substantial... more»

What needs improvement?

I believe continued expansion of integration to multiple systems including SSO and SAML technologies will provide a more-expansive, enterprise view of access orchestration, which will in turn strengthen the security of the environment.
Anonymous avatar x80
Real User
Program Manager at a financial services firm with 1,001-5,000 employees
Jan 01 2018

What is most valuable?

The session recording is useful. We can capture what each of our users are doing. It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access... more»

How has it helped my organization?

It will provide us with more security. Anybody who has access can only get it. It makes admin access more critical. People are not building service accounts. It will provide more security and monitoring.

What needs improvement?

We are going to work on Trade Analytics, so we wanted to see how Trade Analytics work and all. They need to work on some of the enhancements, which we have already given to them. They need to have zero tier and active-active setup with zero... more»
See 36 more reviews

Articles

User Assessments By Topic About CA Privileged Access Manager

Privileged identity management report from it central station 2018 03 31 thumbnail
Find out what your peers are saying about CA Technologies, CyberArk, Quest Software and others in Privileged Identity Management.
265,117 professionals have used our research since 2012.

CA Privileged Access Manager Questions

CA Privileged Access Manager Projects By Members

CA Privileged Access Manager Consultants

What is CA Privileged Access Manager?

CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

Also known as
CA PAM, Xceedium Xsuite
CA Privileged Access Manager customers

NEOVERA, Telesis, eSoft

Vendor 6987 screenshot 1521306715
BUYER'S GUIDE
Not sure which Privileged Identity Management solution is right for you?

Download our free Privileged Identity Management Report and find out what your peers are saying about CA Technologies, CyberArk, Quest Software, and more!
Privileged identity management report from it central station 2018 03 31 thumbnail

Sign Up with Email