CA Privileged Access Manager Server Control [EOL] vs One Identity Privileged Access Suite for Unix comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between CA Privileged Access Manager Server Control [EOL] and One Identity Privileged Access Suite for Unix based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
768,740 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:The most valuable features are session and password management.
Top Answer:There is a new trend of not having any privileged users or accounts. So they look at metrics as a solution. They remove the privileged accounts completely, and anyone from the company that wants to… more »
Top Answer:I rate this solution an eight out of ten. The solution is suitable for larger companies and will be suitable for government entities, large groups, or banks. It's an enterprise solution and not for… more »
Ranking
Unranked
In Privileged Access Management (PAM)
Views
180
Comparisons
127
Reviews
2
Average Words per Review
462
Rating
7.5
Comparisons
Also Known As
CA Access Control, CA Privileged Identity Manager
Learn More
Overview
CA Access Control provides tools to protect your system in both ways against unauthorized use of computer resources: block unauthorized users from accessing the system and block authorized users from accessing items to which they should not have access. CA Access Control also provides auditing tools that let you trace users' activities to track attempted misuse of the computer system.

The Privileged Access Suite for Unix is a one-stop shop for UNIX security that combines Active Directory bridge and root-delegation solutions in one console. It extends the authentication and authorization of Active Directory to UNIX, Linux, and Mac OS X users consolidating and unifying identities. Plus, it assigns individual accountability, enables least-privilege access and centralizes access reporting of the UNIX root account.

Sample Customers
Colruyt Group, Logicalis, TIS Inc.
University of East Anglia, nForce Secure, dunnhumby
Company Size
REVIEWERS
Small Business33%
Midsize Enterprise22%
Large Enterprise44%
No Data Available
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
768,740 professionals have used our research since 2012.

CA Privileged Access Manager Server Control [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while One Identity Privileged Access Suite for Unix is ranked 20th in Privileged Access Management (PAM) with 3 reviews. CA Privileged Access Manager Server Control [EOL] is rated 7.8, while One Identity Privileged Access Suite for Unix is rated 7.6. The top reviewer of CA Privileged Access Manager Server Control [EOL] writes "I like that the access control on the agent. Installation is difficult". On the other hand, the top reviewer of One Identity Privileged Access Suite for Unix writes "A reliable solution with great password and session management". CA Privileged Access Manager Server Control [EOL] is most compared with , whereas One Identity Privileged Access Suite for Unix is most compared with ManageEngine PAM360 and WALLIX Bastion.

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.