Fortra's Powertech Identity & Access Manager vs Fudo PAM comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fortra's Powertech Identity & Access Manager and Fudo PAM based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't handle all the use cases. Often there is not even a way to customize the application to meet uncommon use cases and HelpSystems provides an infrastructure that lends itself to the ability to be customized."

More Fortra's Powertech Identity & Access Manager Pros →

"it's perfect to control and administer computers in our company.""Fudo PAM was the most flexible and intuitive interface out of all of the products in the PAM sector.""Session recording and password management are the two main aspects.""The main benefit of the solution is that it's very easy to set up. It only takes a couple of hours to install everything.""We are convinced that Fudo PAM is better than competing products like WALLIX."

More Fudo PAM Pros →

Cons
"In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have long-term experience with it."

More Fortra's Powertech Identity & Access Manager Cons →

"I would like to see better server management. You have to know exactly what you're looking for to get the right server.""Professional training and certification would be great.""The configuration is difficult.""Fudo PAM’s scalability is not very strong.""The stability is not very good."

More Fudo PAM Cons →

Pricing and Cost Advice
Information Not Available
  • "The pricing is great. We've been given discounts that make it cheaper than using any other solution."
  • More Fudo PAM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:Session recording and password management are the two main aspects.
    Top Answer:There are some areas for improvement in the Fudo PAM cake that we want to improve in terms of scaling. Scaling is an optional feature because we closed some big projects with enterprise customers from… more »
    Top Answer:The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password… more »
    Ranking
    Views
    72
    Comparisons
    60
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    1,113
    Comparisons
    648
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    HelpSystems Powertech Identity & Access Manager, Powertech Identity & Access Manager, BoKS, BoKS ServerControl, Fox Technologies ApplicationControl, ApplicationControl
    Fudo Privileged Access Management
    Learn More
    Fortra
    Video Not Available
    Overview

    Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

    We are the leading vendor of innovative IT security solutions. We focus on privileged access management and privileged session monitoring, combined under the Fudo Security brand. The Fudo product line merges innovation and an intuitive user experience with strong security features. These are the hallmarks of the future designs of the company.

    Sample Customers
    Integris Health
    KFC, BP, Santander, Burger King, ING, Starbucks, Yahoo, DHL
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company16%
    Energy/Utilities Company9%
    Comms Service Provider7%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise19%
    Large Enterprise53%
    Buyer's Guide
    Privileged Access Management (PAM)
    March 2024
    Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
    765,386 professionals have used our research since 2012.

    Fortra's Powertech Identity & Access Manager is ranked 37th in Privileged Access Management (PAM) while Fudo PAM is ranked 21st in Privileged Access Management (PAM) with 5 reviews. Fortra's Powertech Identity & Access Manager is rated 5.0, while Fudo PAM is rated 8.0. The top reviewer of Fortra's Powertech Identity & Access Manager writes "Inexperienced support for old product, but good flexibility for use case customization". On the other hand, the top reviewer of Fudo PAM writes " Works with SCTP, STTPS, SQL, and MySQL protocols". Fortra's Powertech Identity & Access Manager is most compared with , whereas Fudo PAM is most compared with WALLIX Bastion, CyberArk Privileged Access Manager, Delinea Secret Server, One Identity Safeguard and ManageEngine PAM360.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.