Compare ARCON Privileged Access Management vs. Symantec Privileged Access Manager

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Symantec Privileged Access Manager? Share your opinion.
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: January 2021.
457,209 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The initial setup is very straightforward. It's not complex at all.""100% compliant and you don't have to maintain ID management for each and every user."

More ARCON Privileged Access Management Pros »

"Comprehensive coverage of the required features for the PAM solution."

More Symantec Privileged Access Manager Pros »

Cons
"The solution needs more work on the password management side of things. Password management is a big challenge for us, and I would like to improve this aspect. We're finding that BeyondTrust is better in this regard, which is why we're probably going to migrate over. It will offer better security I think.""Hazard flow could be improved, the data compliance portion."

More ARCON Privileged Access Management Cons »

"The management console could be improved."

More Symantec Privileged Access Manager Cons »

report
Use our free recommendation engine to learn which Privileged Access Management solutions are best for your needs.
457,209 professionals have used our research since 2012.
Ranking
Views
3,723
Comparisons
1,747
Reviews
3
Average Words per Review
495
Rating
8.0
Views
5,459
Comparisons
3,186
Reviews
2
Average Words per Review
241
Rating
6.5
Popular Comparisons
Also Known As
ARCON ARCOS, ARCON PAMCA PAM, Xceedium Xsuite, CA Privileged Access Manager
Learn
ARCON
Broadcom
Overview

ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.

The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.

Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.

ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.

While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.

CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

Offer
Learn more about ARCON Privileged Access Management
Learn more about Symantec Privileged Access Manager
Sample Customers
RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS NEOVERA, Telesis, eSoft
Top Industries
REVIEWERS
Financial Services Firm82%
Energy/Utilities Company9%
Healthcare Company9%
VISITORS READING REVIEWS
Computer Software Company41%
Comms Service Provider25%
Financial Services Firm8%
University7%
REVIEWERS
Financial Services Firm21%
Retailer16%
Logistics Company16%
Government11%
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider23%
Government7%
Financial Services Firm6%
Company Size
REVIEWERS
Small Business24%
Midsize Enterprise24%
Large Enterprise53%
REVIEWERS
Small Business28%
Midsize Enterprise5%
Large Enterprise67%
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management. Updated: January 2021.
457,209 professionals have used our research since 2012.

ARCON Privileged Access Management is ranked 5th in Privileged Access Management with 3 reviews while Symantec Privileged Access Manager is ranked 8th in Privileged Access Management with 1 review. ARCON Privileged Access Management is rated 8.0, while Symantec Privileged Access Manager is rated 0.0. The top reviewer of ARCON Privileged Access Management writes "Good security with an easy initial setup and good stability". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Great features that provide comprehensive coverage of what's required for the PAM solution". ARCON Privileged Access Management is most compared with CyberArk PAS, BeyondTrust Endpoint Privilege Management, WALLIX Bastion, Thycotic Secret Server and One Identity Manager, whereas Symantec Privileged Access Manager is most compared with CyberArk PAS, Cisco ISE (Identity Services Engine), ForgeRock, BeyondTrust Endpoint Privilege Management and Thycotic Secret Server.

See our list of best Privileged Access Management vendors.

We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.