out of 21 in Privileged Access Management
out of 44 in User Provisioning Software
Compared 86% of the time.
Compared 14% of the time.
Compared 54% of the time.
Compared 46% of the time.
Also Known As
|CA Access Control, CA Privileged Identity Manager|
|CA Technologies||RM5 Software|
|CA Access Control provides tools to protect your system in both ways against unauthorized use of computer resources: block unauthorized users from accessing the system and block authorized users from accessing items to which they should not have access. CA Access Control also provides auditing tools that let you trace users' activities to track attempted misuse of the computer system.||Identity and access governance solution with user and entitlement management, federated authentication, API access and UI embedding.|
Learn more about CA Privileged Access Manager Server Control
Learn more about RM5 IdM
|Colruyt Group, Logicalis, TIS Inc.||Kilde, PRH, Med Bit, Vantaa, Tampere, Javerdel, Roskidle Kommune|
See also CA Privileged Access Manager Server Control Reviews, RM5 IdM Reviews, and our list of Best Privileged Access Management Companies.