Fortra's Powertech Identity & Access Manager vs Microsoft Purview Privileged Access Management comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Fortra's Powertech Identity & Access Manager and Microsoft Purview Privileged Access Management based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"HelpSystems Powertech's feature that I have found most valuable is its flexibility. It is able to be extended. A lot of the products these days, especially the ones on the cloud, are limited and can't handle all the use cases. Often there is not even a way to customize the application to meet uncommon use cases and HelpSystems provides an infrastructure that lends itself to the ability to be customized."

More Fortra's Powertech Identity & Access Manager Pros →

"The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial."

More Microsoft Purview Privileged Access Management Pros →

Cons
"In terms of what could be improved, I would say the support of the product. It's hard to get support for it. I think this is emblematic of the fact that they don't have a lot of employees who have long-term experience with it."

More Fortra's Powertech Identity & Access Manager Cons →

"There's room for improvement in Microsoft's documentation, as it often lacks clarity."

More Microsoft Purview Privileged Access Management Cons →

report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
768,578 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial.
Top Answer:There's room for improvement in Microsoft's documentation, as it often lacks clarity. The disconnect between what's documented and what's happening in the system can be challenging for users to… more »
Top Answer:We employ it for data loss protection, focusing on its significant and granular capabilities. Ensuring the prevention of data leaks is crucial, especially when dealing with sensitive user data. It is… more »
Ranking
Views
73
Comparisons
61
Reviews
0
Average Words per Review
0
Rating
N/A
Views
1,058
Comparisons
557
Reviews
1
Average Words per Review
733
Rating
9.0
Comparisons
Also Known As
HelpSystems Powertech Identity & Access Manager, Powertech Identity & Access Manager, BoKS, BoKS ServerControl, Fox Technologies ApplicationControl, ApplicationControl
Microsoft Privileged Access Management (PAM)
Learn More
Fortra
Video Not Available
Overview

Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow. This configuration gives users just-enough-access to perform the task at hand, without risking exposure of sensitive data or critical configuration settings. Enabling privileged access management in Microsoft 365 allows your organization to operate with zero standing privileges and provide a layer of defense against standing administrative access vulnerabilities.

Sample Customers
Integris Health
Information Not Available
Top Industries
No Data Available
VISITORS READING REVIEWS
Computer Software Company17%
Manufacturing Company11%
Financial Services Firm8%
Non Profit5%
Company Size
No Data Available
VISITORS READING REVIEWS
Small Business19%
Midsize Enterprise18%
Large Enterprise63%
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
768,578 professionals have used our research since 2012.

Fortra's Powertech Identity & Access Manager is ranked 39th in Privileged Access Management (PAM) while Microsoft Purview Privileged Access Management is ranked 11th in Privileged Access Management (PAM) with 1 review. Fortra's Powertech Identity & Access Manager is rated 5.0, while Microsoft Purview Privileged Access Management is rated 9.0. The top reviewer of Fortra's Powertech Identity & Access Manager writes "Inexperienced support for old product, but good flexibility for use case customization". On the other hand, the top reviewer of Microsoft Purview Privileged Access Management writes "Enhanced security and simplified management offering a centralized solution with granular settings". Fortra's Powertech Identity & Access Manager is most compared with , whereas Microsoft Purview Privileged Access Management is most compared with CyberArk Privileged Access Manager, Delinea Privileged Access Service and Delinea Secret Server.

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.