ChrisMorrisonTechnical Engineer at a tech services company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"It is sad that people with a limited budget won't be able to afford it."
"The price model is based on the number of devices and opposed to the number of users, and it is not very flexible."
Earn 20 points
Centrify Privilege Service provides all of your IT administration teams with secure, granular access to infrastructure regardless of location, and without the hassles of a VPN.
Secure browser-based access Authorized IT users launch management sessions for resources directly from the Privilege Service portal. Sessions use SSH and RDP protocols, and are always protected end-to-end.
Access across organizational boundaries Privilege Service enables you to authenticate your IT users through Active Directory, LDAP Centrify Cloud Directory, or Google G Suite
Directory. You can use one or any combination of these identity stores to grant granular access to employees, business partners and outside vendors.
Grant access to specific resources Unlike a VPN, Privilege Service enables you to grant access to
resources on a on a per-resource basis. This means that you can easily give your internal IT admins access to as much of your infrastructure as necessary, while limiting access by an outsourced
team to only the servers and network hardware their business role or IT function requires.
Access from any location Your IT admins can log in and securely access resources from any location that can reach the Privilege Service. For user logins outside the corporate network, you can require Centrify’s built-in multi-factor authentication for security stronger than a user name and password.
Comprehensive privileged access management solution
Privilege misuse is a top cybersecurity threat today that often results in expensive losses and can even cripple businesses. It's also one of the most popular attack vectors among hackers, because when successfully carried out, it provides free access to an enterprise's underbelly, often without raising any alarms until the damage is done.
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.
PAM360 is a comprehensive solution for businesses looking to incorporate PAM into their overall security operations. With PAM360's contextual integration capabilities, you can build a central console where different parts of your IT management system interconnect for deeper correlation of privileged access data and overall network data, facilitating meaningful inferences and quicker remedies.
Centrify Privileged Access Service is ranked 9th in Privileged Access Management with 2 reviews while ManageEngine PAM360 is ranked 14th in Privileged Access Management. Centrify Privileged Access Service is rated 6.0, while ManageEngine PAM360 is rated 0.0. The top reviewer of Centrify Privileged Access Service writes "Has good privileged account management, multifactor authentication and auditing features". On the other hand, Centrify Privileged Access Service is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, HashiCorp Vault, BeyondTrust Endpoint Privilege Management and OpenIAM Identity Governance, whereas ManageEngine PAM360 is most compared with CyberArk Privileged Access Manager, Thycotic Secret Server, One Identity Privileged Access Suite for Unix and ARCON Privileged Access Management.
See our list of best Privileged Access Management vendors.
We monitor all Privileged Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.