We performed a comparison between Hitachi ID Privileged Access Manager [EOL] and Symantec Privileged Access Manager based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."
"One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements."
"Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated."
"We know we can scale up with what we have, and we probably will not need to buy any further appliances down the road."
"It will provide us with more security."
"For me, it is the robust API which is the most valuable feature. This allows for low maintenance costs and allows applications to automatically connect. This is great to automate security of the DevOps pipeline for shared secrets across environments. Also, being on Linux and a virtual appliance is great."
"Whoever built it from the ground up, they understand how an organization is laid out."
"It gives you list of servers, so you can see which users have access to which servers. This is really useful, so we can make sure nobody is getting extra access than what is needed."
"We can check the activities in the server for fragile files and documents in case of any issues."
"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."
"I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using."
"Instead of just giving passwords to the user based on job function, from auditing perspective, turn that cycle around. That would really help from an auditing standpoint."
"They need to do a little bit more on the mainframe side."
"An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username."
"The management console could be improved."
"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way."
"It's difficult to locate the reports, there are limits on what reports can be run from the GUI, and the report formats are lacking."
"We have to do a lot of manual work to automate features."
More Hitachi ID Privileged Access Manager [EOL] Pricing and Cost Advice →
More Symantec Privileged Access Manager Pricing and Cost Advice →
Earn 20 points
Hitachi ID Privileged Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. Hitachi ID Privileged Access Manager [EOL] is rated 7.0, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of Hitachi ID Privileged Access Manager [EOL] writes "Responsive support, requires little maintenance, but configuration could be easier". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". Hitachi ID Privileged Access Manager [EOL] is most compared with , whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management and Delinea Secret Server.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.