Hitachi ID Privileged Access Manager [EOL] vs Microsoft Purview Privileged Access Management comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Hitachi ID Privileged Access Manager [EOL] and Microsoft Purview Privileged Access Management based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"If you using IGA or access controls solutions then this solution is a good addon. Once Hitachi ID Privileged Access Manager is set up it does not require a lot of maintenance or attention."

More Hitachi ID Privileged Access Manager [EOL] Pros →

"The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial."

More Microsoft Purview Privileged Access Management Pros →

Cons
"Hitachi ID Privileged Access Manager is cumbersome and it does not operate by itself and relies on other solutions. Overall the way you configure things is a bit awkward compared to other solutions, such as Cyberark and Thycotic. The interface could be more intuitive, some features I expected to be easily accessible I had to search around for them. There needs to be more centralization."

More Hitachi ID Privileged Access Manager [EOL] Cons →

"There's room for improvement in Microsoft's documentation, as it often lacks clarity."

More Microsoft Purview Privileged Access Management Cons →

Pricing and Cost Advice
Information Not Available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
767,847 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:The ability to provide just-in-time privileged access and set specific parameters for access duration is highly beneficial.
Top Answer:There's room for improvement in Microsoft's documentation, as it often lacks clarity. The disconnect between what's documented and what's happening in the system can be challenging for users to… more »
Top Answer:We employ it for data loss protection, focusing on its significant and granular capabilities. Ensuring the prevention of data leaks is crucial, especially when dealing with sensitive user data. It is… more »
Ranking
Unranked
In Privileged Access Management (PAM)
Views
1,058
Comparisons
557
Reviews
1
Average Words per Review
733
Rating
9.0
Comparisons
Also Known As
Microsoft Privileged Access Management (PAM)
Learn More
Overview

Hitachi ID Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability.

Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

Privileged Access Manager grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premise or in the cloud.

Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow. This configuration gives users just-enough-access to perform the task at hand, without risking exposure of sensitive data or critical configuration settings. Enabling privileged access management in Microsoft 365 allows your organization to operate with zero standing privileges and provide a layer of defense against standing administrative access vulnerabilities.

Top Industries
No Data Available
VISITORS READING REVIEWS
Computer Software Company17%
Manufacturing Company11%
Financial Services Firm8%
Non Profit5%
Company Size
No Data Available
VISITORS READING REVIEWS
Small Business19%
Midsize Enterprise18%
Large Enterprise63%
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
767,847 professionals have used our research since 2012.

Hitachi ID Privileged Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Privileged Access Management (PAM) while Microsoft Purview Privileged Access Management is ranked 11th in Privileged Access Management (PAM) with 1 review. Hitachi ID Privileged Access Manager [EOL] is rated 7.0, while Microsoft Purview Privileged Access Management is rated 9.0. The top reviewer of Hitachi ID Privileged Access Manager [EOL] writes "Responsive support, requires little maintenance, but configuration could be easier". On the other hand, the top reviewer of Microsoft Purview Privileged Access Management writes "Enhanced security and simplified management offering a centralized solution with granular settings". Hitachi ID Privileged Access Manager [EOL] is most compared with , whereas Microsoft Purview Privileged Access Management is most compared with CyberArk Privileged Access Manager and Delinea Privileged Access Service.

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.