CA Privileged Access Manager Server Control [EOL] vs Hitachi ID Privileged Access Manager [EOL] comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between CA Privileged Access Manager Server Control [EOL] and Hitachi ID Privileged Access Manager [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
Ranking
Unranked
In Privileged Access Management (PAM)
Unranked
In Privileged Access Management (PAM)
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
768,740 professionals have used our research since 2012.
Comparisons
Also Known As
CA Access Control, CA Privileged Identity Manager
Learn More
Overview
CA Access Control provides tools to protect your system in both ways against unauthorized use of computer resources: block unauthorized users from accessing the system and block authorized users from accessing items to which they should not have access. CA Access Control also provides auditing tools that let you trace users' activities to track attempted misuse of the computer system.

Hitachi ID Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability.

Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

Privileged Access Manager grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premise or in the cloud.

Sample Customers
Colruyt Group, Logicalis, TIS Inc.
Information Not Available
Company Size
REVIEWERS
Small Business33%
Midsize Enterprise22%
Large Enterprise44%
No Data Available
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
768,740 professionals have used our research since 2012.

CA Privileged Access Manager Server Control [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while Hitachi ID Privileged Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM). CA Privileged Access Manager Server Control [EOL] is rated 7.8, while Hitachi ID Privileged Access Manager [EOL] is rated 7.0. The top reviewer of CA Privileged Access Manager Server Control [EOL] writes "I like that the access control on the agent. Installation is difficult". On the other hand, the top reviewer of Hitachi ID Privileged Access Manager [EOL] writes "Responsive support, requires little maintenance, but configuration could be easier". CA Privileged Access Manager Server Control [EOL] is most compared with , whereas Hitachi ID Privileged Access Manager [EOL] is most compared with .

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.