We performed a comparison between ARCON Privileged Access Management and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The video logs help us to identify any misuse of privileged accounts."
"It gives us a lot of comfort in terms of security level. Our infrastructure devices and servers are secured and nobody can have unauthorized access to them."
"Logging, particularly screen recording for Windows RDP sessions. Also, command-logging for SSH sessions. This really helps us to see what commands/changes have been executed in a particular service at a given point of time, and by whom."
"We use ARCON Privileged Access Management to monitor and record our admin users' activity."
"The most valuable feature is it is easy to use and the interface is intuitive."
"The entire conversation that is happening between the servers and the client is recorded. It is a good feature if you want to do some analysis, and for investigation."
"With this log available, we can drill down to the activities performed by the people within our kiosk. There is a great feature where in the case of Unix servers, we have our own text-based logs. In the case of Window's server, we cannot create a text-based log, so our kiosk takes the screenshot or picture of the screen when I am working. It does this every three seconds."
"Session recording is the most valuable feature, as it covers compliance and it also covers our in-house applications."
"Stability is solid as a rock."
"It is great for identity governance."
"It will provide us with more security."
"The key benefits are we improve our governance. We ensure we can build more trust in the way we run and operate our environment, and most of all is the accountability."
"It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access than what is needed."
"For me, it is the robust API which is the most valuable feature. This allows for low maintenance costs and allows applications to automatically connect. This is great to automate security of the DevOps pipeline for shared secrets across environments. Also, being on Linux and a virtual appliance is great."
"It reduces the viral attacks on my website. It also allows certain users access to see what happens daily."
"The DB clustering is a really good benefit of using CA PAM."
"Currently, we can manage only the SSH or RDP connections, but there are many more devices that are present, apart from our SSH and RDP. We want all this to be part of the ARCON solution. For the password management, they should increase the pool of supported devices, they should have more connectors."
"It should be browser-agnostic and, frankly, it is working well on Internet Explorer. It should work on popular browsers like Mozilla and Firefox."
"Currently, along with the upgrade of the ARCON solution, we have to consider the desktops and the endpoints from where the solution will have to be accessed. We have to upgrade those endpoints and desktops as well. So upgrades are not smooth."
"I would like for it to be dependent on Windows as opposed to Linux."
"It would be helpful to have a "Favorites" list. For example, if I have 100 servers but I only go to 10 servers frequently, a Favorites list would allow me to go through those ten servers only."
"Anti-bridging should be built into product."
"The solution lacks to offer a governance mechanism for operational technology assets."
"We expect improvement in the dashboards to provide visibility of password compliance status, whenever a password is opened from the vault. Also, flexibility to customize the live dashboard."
"I wish it could create local accounts on desktops."
"It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking."
"We have to do a lot of manual work to automate features."
"An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username."
"What I hope happens with the new product CA PAM is to keep all the useful features that exist in PA, but what I’ve noticed with many new products is the UI gets polished but systems lags stability and performance or it adds additional complexity instead of simplifying the user experience."
"I would like this solution to be simpler. It should have a one-click access that works together with AWS."
"The management console could be improved."
"They need to have zero tier and active-active setup with zero minimum downtime, which they are working on it. "
More ARCON Privileged Access Management Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. ARCON Privileged Access Management is rated 7.8, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". ARCON Privileged Access Management is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ManageEngine PAM360 and One Identity Manager, whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, Delinea Secret Server and VMware Identity Manager. See our ARCON Privileged Access Management vs. Symantec Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.