CA Privileged Access Manager Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Real User
Program Manager at a financial services firm with 10,001+ employees
Jan 01 2018

What is most valuable?

The session recording is useful. We can capture what each of our users are doing. It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we… more»

How has it helped my organization?

It will provide us with more security. Anybody who has access can only get it. It makes admin access more critical. People are not building service accounts. It will provide more security and… more»

What needs improvement?

We are going to work on Trade Analytics, so we wanted to see how Trade Analytics work and all. They need to work on some of the enhancements, which we have already given to them. They need to have… more»

What's my experience with pricing, setup cost, and licensing?

Cost-wise, CA was better compared to others in the market.

What other advice do I have?

Depending on your requirements, you can compare different products and decide what you want. This product so far seems good to us. Most important criteria when selecting a vendor: Our use cases, all… more»

Which other solutions did I evaluate?

One of the goals for one of our projects this year was to implement Privileged Access Management. We tried different products in the market: Xceedium, CyberArk, etc. This is when we decided on… more»
Zafir Yousaf
Real User
Architect at a comms service provider with 10,001+ employees
Feb 02 2018

What is most valuable?

One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements. This is high on our agenda.

How has it helped my organization?

The key benefits are we improve our governance. We ensure we can build more trust in the way we run and operate our environment, and most of all is the accountability. Where things do go wrong from time to time, we are in a good position to ensure that we can recover quickly.

What needs improvement?

As with most things CA, once we are bringing more technology into the portfolio and being able to collapse those products into a much more integrated way, that will definitely come over the time. In terms of improvement, keep listening to customers and their challenges and make sure the roadmap is… more»

What other advice do I have?

It is fairly mature in the world of what it have known as a vault. When you look in a wider context of how to bring it into an organization, it is not necessarily just the technology side. I would rate it from the technology side between a seven and an eight. Actually, how it becomes too much of an… more»
Find out what your peers are saying about CA (A Broadcom Company), CyberArk, BeyondTrust and others in Privileged Access Management. Updated: September 2019.
371,355 professionals have used our research since 2012.
Alan Ng
Real User
Information Security at ITG
Jan 10 2018

What is most valuable?

Whoever built it from the ground up, they understand how an organization is laid out. You can tell. When a user comes in, it automatically picks up their information. It is very easy to use. The interface is very friendly, colorful, and bold. I really like that. It is friendly to the users.

What needs improvement?

What PAM does is when a user signs in, or when a user gets prompted to an organization, they are classified based on what teams, job titles, and roles that they have. One feature I would like to see is instead of just giving passwords to the user based on job function, from auditing perspective… more»

What other advice do I have?

If your company has Windows, Unix, and Linux, and has accounts all over the place and you need to management it, look into CA now. I feel like I have to learn more about CA PAM, because there are a lot of questions I still have for the product and I do not know them yet. Most important criteria when… more»

Which other solutions did I evaluate?

After doing a little bit of research in the PAM market, there are not too many PAM players out there. Obviously, there is CyberArk but the other big player is CA PAM. I took a look at CA PAM. CA's rep gave me every reason to pick CA PAM over CyberArk. CyberArk is harder to set up. You need a stand… more»
Susan Donelly
Real User
Information Security Manager at United Parcel Service
Feb 01 2018

What is most valuable?

I have been in the security business for almost 30 years. We have never had a solution in place where we could really manage and control privileged accounts in the company. This solution really makes a big difference. We started rolling it out for our Linux base. It has been invaluable to us already, and it has only been a year.

What needs improvement?

We are a multiplatform shop, so we have Windows, Linux, mainframe. The mainframe piece of it is coming along, but we would like to see a little bit more integration with the non-CA mainframe component, such as RACF. That is what we use, but they have more features which are coming out in the next month or so, which is a huge. They are listening to their customers. I think that is great, but they… more»

What other advice do I have?

Right out of the box, right now, I would say it is a solid eight. I think 10 is doable, and they are very close. We are still only a year out. We have only really done one platform, so I am kind of saving the nine and 10 for once we are fully deployed. Most important criteria when selecting a vendor: Support is a big deal. Reputation is great, but the support is what we use most. After the sale is… more»
Asif Shaikh
Consultant
Security Consultant at a tech services company with 10,001+ employees
Jun 03 2018

What is most valuable?

Privileged account management for Windows (domain and local) and Unix.

How has it helped my organization?

* Earlier admins used to access critical system from their desktop, which was a security threat considering the wide variety of compromises happening on endpoint. Now, all… more»

What needs improvement?

Service account management is a key area where the product needs to develop. Currently, the product supports service account discovery, but only if the host name of the… more»

What's my experience with pricing, setup cost, and licensing?

Pricing is fair compared to other top vendors, like CyberArk. The licensing is simple and scalable.

If you previously used a different solution, which one did you use and why did you switch?

No previous solution was used.

What other advice do I have?

Go for it if your key areas are password/session management of Windows/Unix/database. Be careful if you want to use this for service account management. There are some… more»

Which other solutions did I evaluate?

We did not evaluate any other solutions.
Balamurali P
Real User
Solution Architect at Tata Elxsi
Nov 12 2018

What is most valuable?

The DB clustering is a really good benefit of using CA PAM.

What needs improvement?

An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username. Also, it would be nice to have a… more»

What's my experience with pricing, setup cost, and licensing?

I would prefer better licensing options for the 20-100 users we have at a given time.

If you previously used a different solution, which one did you use and why did you switch?

We have previous experience with CyberArk.

What other advice do I have?

So when we are trying develop some particular portal, when you are looking with loop-back IP, connecting the backend by a loop-back IP, the response is coming by an actual IP - that's the portal… more»

Which other solutions did I evaluate?

We also considered CyberArk.
Consultant
Solution Architect at a tech services company with 10,001+ employees
Jan 21 2019

What do you think of CA Privileged Access Manager?

What is our primary use case?

We look to make sure that there are two HyperACCESS specifications:  Privileged managements: These are ordered to ensure that all the passwords assume one location so a user can enter and all their passwords are protected. Their passwords cannot be shared because they are rotated.  The odd user: This user has to go through the system and exercise a chair relay. This should be our Gateway for login. 

What is most valuable?

The most common features that I use are password vaulting and password management. 

What needs improvement?

I would like this solution to be simpler. It should have a one-click access that works together with AWS. 

For how long have I used the solution?

Less than one year.

What do I think about the scalability of the

ReviewerCk326
Consultant
Senior Consultant at a comms service provider with 10,001+ employees
Jan 23 2019

What do you think of CA Privileged Access Manager?

What is our primary use case?

It reduces the viral attacks on my website. It also allows certain users access to see what happens daily.

What is most valuable?

The password manager is a valuable feature. It saves time for the user. The users do not have to remember the password or change the password. It is a user-friendly solution.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability is very good. 

What do I think about the scalability of the solution?

There is enough power to support our whole organization and the scalability potential is very wide. We currently have between 50-100 users of the solution. 

How is customer service and technical support?

The tech support is good. They are very…

Articles

User Assessments By Topic About CA Privileged Access Manager

Find out what your peers are saying about CA (A Broadcom Company), CyberArk, BeyondTrust and others in Privileged Access Management. Updated: September 2019.
371,355 professionals have used our research since 2012.

CA Privileged Access Manager Questions

What is CA Privileged Access Manager?

CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

Also known as
CA PAM, Xceedium Xsuite
CA Privileged Access Manager customers

NEOVERA, Telesis, eSoft

Sign Up with Email