Symantec Privileged Access Manager Benefits

Asif Shaikh
Security Consultant at a tech services company with 10,001+ employees
* Earlier admins used to access critical system from their desktop, which was a security threat considering the wide variety of compromises happening on endpoint. Now, all the privileged access is tunneled through PAM. * With password management, we can enforce complicated password policies and very important frequent password changes, i.e., weekly. * Most importantly, we now have recordings for each and every privileged session which is used for auditing, compliance, and investigations. View full review »
Find out what your peers are saying about Broadcom, CyberArk, BeyondTrust and others in Privileged Access Management. Updated: May 2020.
417,925 professionals have used our research since 2012.