One Identity Privileged Access Suite for Unix vs Stealthbits Privileged Activity Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between One Identity Privileged Access Suite for Unix and Stealthbits Privileged Activity Manager based on real PeerSpot user reviews.

Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM).
To learn more, read our detailed Privileged Access Management (PAM) Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Hicham Barnoussi
Use Stealthbits Privileged Activity Manager?
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
767,847 professionals have used our research since 2012.
Questions from the Community
Top Answer:The most valuable features are session and password management.
Top Answer:There is a new trend of not having any privileged users or accounts. So they look at metrics as a solution. They remove the privileged accounts completely, and anyone from the company that wants to… more »
Top Answer:I rate this solution an eight out of ten. The solution is suitable for larger companies and will be suitable for government entities, large groups, or banks. It's an enterprise solution and not for… more »
Ask a question

Earn 20 points

Ranking
Views
180
Comparisons
127
Reviews
2
Average Words per Review
462
Rating
7.5
Views
125
Comparisons
85
Reviews
0
Average Words per Review
0
Rating
N/A
Comparisons
Learn More
Overview

The Privileged Access Suite for Unix is a one-stop shop for UNIX security that combines Active Directory bridge and root-delegation solutions in one console. It extends the authentication and authorization of Active Directory to UNIX, Linux, and Mac OS X users consolidating and unifying identities. Plus, it assigns individual accountability, enables least-privilege access and centralizes access reporting of the UNIX root account.

With Stealthbits Privileged Activity Manager (SbPAM), organizations are empowered to reduce their risk footprint through a task-based approach to Privileged Access Management. SbPAM provides Administrators the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed, and returns the environment to a no-access-by-default state, immediately upon completion.

Sample Customers
University of East Anglia, nForce Secure, dunnhumby
Disney, mastercard, Florida's Natural, GODIVA, Entergy
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM). Updated: March 2024.
767,847 professionals have used our research since 2012.

One Identity Privileged Access Suite for Unix is ranked 20th in Privileged Access Management (PAM) with 3 reviews while Stealthbits Privileged Activity Manager is ranked 32nd in Privileged Access Management (PAM). One Identity Privileged Access Suite for Unix is rated 7.6, while Stealthbits Privileged Activity Manager is rated 0.0. The top reviewer of One Identity Privileged Access Suite for Unix writes "A reliable solution with great password and session management". On the other hand, One Identity Privileged Access Suite for Unix is most compared with ManageEngine PAM360 and WALLIX Bastion, whereas Stealthbits Privileged Activity Manager is most compared with .

See our list of best Privileged Access Management (PAM) vendors.

We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.