Centrify Privileged Access Service Competitors and Alternatives

Get our free report covering CyberArk, BeyondTrust, Thycotic, and other competitors of Centrify Privileged Access Service. Updated: November 2020.
446,956 professionals have used our research since 2012.

Read reviews of Centrify Privileged Access Service competitors and alternatives

reviewer1384740
Project Manager at a healthcare company with 10,001+ employees
Real User
Jul 31, 2020
Simple and 100% compliant with great features; saved us many hours of down time

What is our primary use case?

Our company is involved in the health care sector and our primary use case of this solution is for compliance. Previously we used a system that included an Excel sheet but it would crash all the time because we have a large number of IT executives; tech related, application development and other administrators. We weren't able to receive the complete audit file that told us who was accessing and who was deleting what. It wasn't in compliance with data information security. For that reason we introduced the PAM solution and it's working extremely well. We're using it constantly on a daily… more »

Pros and Cons

  • 100% compliant and you don't have to maintain ID management for each and every user.
  • Hazard flow could be improved, the data compliance portion.

What other advice do I have?

This is a very good enterprise solution and I would say that all enterprise companies should be using products like this. We're satisfied with the features and availability of this product. I would rate this solution a 10 out of 10.
IkedeEbhole
Pre-sales Engineer at StarLink - Trusted Security Advisor
Real User
Top 20
Nov 11, 2019
Storing User Passwords and Credentials, Facilitates auditing by recording activity

What is our primary use case?

The primary use case is for storing user passwords and administration credentials. I am the engineer for a company that sells this solution mostly to financial institutions. It is also useful for auditing and securing shared accounts or co-shared accounts.

Pros and Cons

  • The most valuable feature is the special management. It records the activity and the actions that we use for auditing.
  • The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance.

What other advice do I have?

I have learned that the deployment can be tricky. Always plan your deployment in phases. Don't unload all of your privilege credentials at once, otherwise, you have an issue with the passwords. Always, have help available on standby when you are deploying this solution to prevent issues. This solution is quite efficient. You don't always have to have your applications. If you are encrypting the server, you don't need the applications. You are required to do it on your workstation. The server will deliver that to you from the managing pack when you try to implement the sessions. I would rate…
Get our free report covering CyberArk, BeyondTrust, Thycotic, and other competitors of Centrify Privileged Access Service. Updated: November 2020.
446,956 professionals have used our research since 2012.