Fudo PAM Primary Use Case

TD
BDM at Oberig-it

The main use case is for protecting privileged user access, such as securing remote access services. Another important use case is when we work with third-party users and need to provide password management for privileged users. These are two additional main concepts.

When we talk about third-party users, it's a usual tool because Fudo PAM is a privileged access management tool.

We are referring to different users, such as IT administrators, database administrators, and third-party users. The users who connect to customers' manufacturers to solve outsourcing problems, etc. These are classic cases where we propose Fudo PAM to our customers and use it for our infrastructure.

View full review »
Oleksiy-Zaionchkovskyy - PeerSpot reviewer
Security Solutions Architect at Netwave

I work for an IT integrator company. We're resellers.

View full review »
SK
Information Technology Security Specialist at BornaNetworkManagers

The access management part of the solution is the primary part of the product that we use. The client that we have wants to limit user access to applications within the user's sessions. The client wants to keep logs about the users who are working on their servers. The main purpose is really to maintain these logs and restrict the use of applications in a user's session.  

View full review »
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about Fudo Security, CyberArk, WALLIX and others in Privileged Access Management (PAM). Updated: March 2024.
765,234 professionals have used our research since 2012.
OZ
Lead Systems Architect at IT Specialist LLC

We are a system integrator and this is one of the solutions that we provide to our clients. We also use this solution internally.

Fudo PAM is used for access management.

View full review »
IS
IT Specialist at IT Specialist LLC

We use this product to control access and to administer computers and servers in our company. We are a reseller. We have engineers who configure Fudo Privileged Access Management and deploy the product for our customers. We also test Fudo Privileged Access Management and in the future, we will sell some technical instruments to go along with the product.

View full review »
Buyer's Guide
Privileged Access Management (PAM)
March 2024
Find out what your peers are saying about Fudo Security, CyberArk, WALLIX and others in Privileged Access Management (PAM). Updated: March 2024.
765,234 professionals have used our research since 2012.