Leiberman RED Identity Management [EOL] vs Symantec Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Leiberman RED Identity Management [EOL] and Symantec Privileged Access Manager based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's more of a risk reduction. It takes passwords that are not being managed properly and manages them automatically which really reduces risk."

More Leiberman RED Identity Management [EOL] Pros →

"Whoever built it from the ground up, they understand how an organization is laid out.""You can do A2A integration. You can have your own script, which can then run outside of PA to retrieve the password and perform other tasks.""Password Management and Session Recording. The simplicity and ease that it is to be up and running out-of-the-box is very much appreciated.""It reduces the viral attacks on my website. It also allows certain users access to see what happens daily.""We can enforce complicated password policies and very important frequent password changes.""The interface is very friendly, colorful, and bold.""CA PAM is working well for us.""One of the key things for us about the product is around its simplicity. Being able to put in the technology that allows the business to remove complexity and also allow the security improvements."

More Symantec Privileged Access Manager Pros →

Cons
"They should improve the application password management. The capability to manage high availability application passwords is its biggest shortcoming."

More Leiberman RED Identity Management [EOL] Cons →

"Bring more technology into the portfolio and being able to collapse those products into a much more integrated way.""They need to have zero tier and active-active setup ​with zero minimum downtime, which they are working on it. ​""I would like this solution to be simpler. It should have a one-click access that works together with AWS.""The setup is complex.""I’m no fan of Java as an application front-end, as it tends to have issues depending on what browser one’s using.""An improvement for this solution is that it should not be constantly based on user name and password. There should be a condition to edit and update your username.""We experience stability issues after every patch upgrade. This is a place where CA needs to improve drastically.""The management console could be improved."

More Symantec Privileged Access Manager Cons →

Pricing and Cost Advice
Information Not Available
  • "Don’t go with an agent model. Don’t go with a model that has you buying a thousand different parts. Go with PAM that gives you everything, or you’ll just be paying costs of implementing another tool that PAM would have just given you up front."
  • "The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution."
  • "Appliances are relatively cheap, don’t skimp. Make sure you have redundancy, high availability, and enough appliances to manage the concurrent workload."
  • "Cost-wise, CA was better compared to others in the market. ​"
  • "Pricing is fair compared to other top vendors."
  • "The licensing is simple and scalable."
  • "I would prefer better licensing options for the 20-100 users we have at a given time."
  • "It is more expensive than other solutions on the market."
  • More Symantec Privileged Access Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:We can check the activities in the server for fragile files and documents in case of any issues.
    Top Answer:The product's pricing depends on the agreement. They offer per-device, per-user, or monthly and yearly licensing models.
    Top Answer:There should be some training platform similar to Microsoft and IBM. We can't find useful documentation or YouTube videos to learn about the process. They should include some assignments in the test… more »
    Ranking
    Unranked
    In Privileged Access Management (PAM)
    Views
    860
    Comparisons
    546
    Reviews
    3
    Average Words per Review
    424
    Rating
    6.7
    Comparisons
    Also Known As
    Rapid Enterprise Defense Identity Management, Enterprise Random Password Manager
    CA PAM, Xceedium Xsuite, CA Privileged Access Manager
    Learn More
    BeyondTrust
    Video Not Available
    Overview

    Enterprise Random Password Manager (ERPM) is a Proactive Cyber Defense Platform that protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks – on-premises, in the cloud and in hybrid environments.

    CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.  It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers

    Sample Customers
    CME, VISA, Commerzbank, Rothschild, NMS, MHA, UAM, Tulane University, NYC, Lasko, Shell, ComEd, Petco, NetApp, Sharp, At&T, Brocade, Fox, CSC
    NEOVERA, Telesis, eSoft
    Top Industries
    No Data Available
    REVIEWERS
    Retailer20%
    Financial Services Firm20%
    Logistics Company15%
    Government10%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Manufacturing Company14%
    Financial Services Firm13%
    Comms Service Provider10%
    Company Size
    No Data Available
    REVIEWERS
    Small Business28%
    Midsize Enterprise9%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise7%
    Large Enterprise78%
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    768,740 professionals have used our research since 2012.

    Leiberman RED Identity Management [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while Symantec Privileged Access Manager is ranked 18th in Privileged Access Management (PAM) with 50 reviews. Leiberman RED Identity Management [EOL] is rated 7.8, while Symantec Privileged Access Manager is rated 7.8. The top reviewer of Leiberman RED Identity Management [EOL] writes "It’s greatest ability is that it can easily randomize all local accounts on almost any endpoint". On the other hand, the top reviewer of Symantec Privileged Access Manager writes "Allows IT and consultants to access the infrastructure environment but needs more security and better support". Leiberman RED Identity Management [EOL] is most compared with , whereas Symantec Privileged Access Manager is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management and Delinea Secret Server.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.