Cancel
You must select at least 2 products to compare!
Cmd Logo
101 views|39 comparisons
Fudo Security Logo
1,091 views|638 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cmd and Fudo PAM based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,857 professionals have used our research since 2012.
Featured Review
Oleksiy-Zaionchkovskyy
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Ranking
    Views
    101
    Comparisons
    39
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    1,091
    Comparisons
    638
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Fudo Privileged Access Management
    Learn More
    Cmd
    Video Not Available
    Overview

    Cmd is a Linux command-line visibility, protection, and authorization platform that's powerful yet easy to use.

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    Sample Customers
    Uber, zenefits, REDOX, Qubole, eagleview, Gremlin
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company15%
    Media Company8%
    Comms Service Provider7%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business31%
    Midsize Enterprise17%
    Large Enterprise52%
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    768,857 professionals have used our research since 2012.

    Cmd is ranked 41st in Privileged Access Management (PAM) while Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews. Cmd is rated 0.0, while Fudo PAM is rated 8.0. On the other hand, the top reviewer of Fudo PAM writes "Easy to install but needs to provide better server management and organization". Cmd is most compared with , whereas Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, One Identity Safeguard and ManageEngine PAM360.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.