Hitachi ID Privileged Access Manager Competitors and Alternatives

Get our free report covering CA Technologies, CyberArk, and other competitors of Hitachi ID Privileged Access Manager.
309,398 professionals have used our research since 2012.
Read reviews of Hitachi ID Privileged Access Manager competitors and alternatives
Anonymous User
Consultant
CyberArk Consultant at a comms service provider with 10,001+ employees
Jun 14 2017

What is most valuable?

The password management component (CPM) is the most valuable. This enables companies to automate password management on... more»

How has it helped my organization?

Implementing CyberArk is not only "rolling out" a tool. It also will force the company to have a good look at the... more»

What needs improvement?

Allthough it's highly configurable, the user interface could use a do-over. The current interface doesn't scale that... more»

What's my experience with pricing, setup cost, and licensing?

I do not have anything to do with pricing.

Which solutions did we use previously?

We did not have a previous solution.

What other advice do I have?

Do a detailed assessment of your requirements before you invest. Map the requirements to the functionality and go just... more»
Anonymous User
Real User
Project Coordinator at a logistics company with 10,001+ employees
Jul 23 2017

What is most valuable?

Gives us the ability to rotate passwords automatically in the vault, on in any interval, via a scheduled job or... more»

How has it helped my organization?

Without getting too specific, we are able to manage root account passwords on 1600+ Linux servers. Our users can... more»

What needs improvement?

The OOTB reporting functionality is lacking. The ability to view a simple breakdown of the various data. They offer an... more»

What's my experience with pricing, setup cost, and licensing?

I was not involved in the negotiations of the product.

Which solutions did we use previously?

We didn’t have a previous solution.

What other advice do I have?

My only advice is to make sure you perform a through PoC in your environment to make sure all aspects of the system... more»

Sign Up with Email