Fudo PAM Primary Use Case

Mahdi Talaee
Information Technology Security Specialist at BornaNetworkManagers
The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session. View full review »
Oleksiy Zaionchkovskyy
Lead Systems Architect at IT Specialist LLC
We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally. Fudo PAM is used for access management. View full review »
Ihor Samofalov
IT Specialist at IT Specialist LLC
We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product. View full review »
Find out what your peers are saying about Fudo Security, CyberArk, One Identity and others in Privileged Access Management. Updated: October 2020.
443,152 professionals have used our research since 2012.