Compare Cmd vs. HelpSystems Powertech Identity & Access Manager

Cancel
You must select at least 2 products to compare!
Ranking
Views
26
Comparisons
11
Reviews
0
Average Words per Review
0
Rating
N/A
Views
88
Comparisons
64
Reviews
0
Average Words per Review
0
Rating
N/A
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: August 2021.
535,015 professionals have used our research since 2012.
Comparisons
Also Known As
Powertech Identity & Access Manager, BoKS, BoKS ServerControl, Fox Technologies ApplicationControl, ApplicationControl
Learn More
Cmd
Video Not Available
Overview

Cmd is a Linux command-line visibility, protection, and authorization platform that's powerful yet easy to use.

Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

Offer
Learn more about Cmd
Learn more about HelpSystems Powertech Identity & Access Manager
Sample Customers
Uber, zenefits, REDOX, Qubole, eagleview, Gremlin
Integris Health
Find out what your peers are saying about CyberArk, One Identity, Thycotic and others in Privileged Access Management (PAM). Updated: August 2021.
535,015 professionals have used our research since 2012.

Cmd is ranked 31st in Privileged Access Management (PAM) while HelpSystems Powertech Identity & Access Manager is ranked 20th in Privileged Access Management (PAM). Cmd is rated 0.0, while HelpSystems Powertech Identity & Access Manager is rated 0.0. On the other hand, Cmd is most compared with , whereas HelpSystems Powertech Identity & Access Manager is most compared with .

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.