Introducing G2.ai, the future of software buying.Try now

Best Enterprise Privileged Access Management (PAM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Privileged Access Management (PAM) category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Privileged Access Management (PAM) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Privileged Access Management (PAM) category.

In addition to qualifying for inclusion in the Privileged Access Management (PAM) Software category, to qualify for inclusion in the Enterprise Business Privileged Access Management (PAM) Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

19 Listings in Enterprise Privileged Access Management (PAM) Software Available

(854)4.5 out of 5
5th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Microsoft Entra ID
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    75
    Security
    68
    Identity Management
    54
    Single Sign-On
    48
    SSO (Single Sign-On)
    41
    Cons
    Expensive
    31
    Cost
    19
    Integration Issues
    19
    Missing Features
    17
    Complexity
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra ID features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,084,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Mid-Market
  • 37% Enterprise
Microsoft Entra ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
75
Security
68
Identity Management
54
Single Sign-On
48
SSO (Single Sign-On)
41
Cons
Expensive
31
Cost
19
Integration Issues
19
Missing Features
17
Complexity
15
Microsoft Entra ID features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,084,579 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
(3,772)4.5 out of 5
Optimized for quick response
1st Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:$3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • JumpCloud is a platform that provides Active Directory, Access Management, Endpoint management, and Password management services, centralizing access de/provisioning and managing user endpoints.
    • Reviewers frequently mention the ease of use, the user-friendly interface, the efficient management of user credentials, and the ability to integrate with many apps, which simplifies managing access and automating access requests.
    • Reviewers experienced issues with the command part needing improvement to run multiple commands on multiple devices, limitations on some new EDR software, and a lack of robustness in device management compared to other tools.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JumpCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    899
    Device Management
    703
    Security
    524
    Integrations
    522
    User Management
    449
    Cons
    Missing Features
    356
    Improvement Needed
    284
    Limited Features
    228
    UX Improvement
    158
    Limitations
    155
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JumpCloud features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Reporting
    Average: 8.8
    8.4
    Approval Workflows
    Average: 8.7
    8.6
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Louisville, CO
    Twitter
    @JumpCloud
    36,605 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    918 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • JumpCloud is a platform that provides Active Directory, Access Management, Endpoint management, and Password management services, centralizing access de/provisioning and managing user endpoints.
  • Reviewers frequently mention the ease of use, the user-friendly interface, the efficient management of user credentials, and the ability to integrate with many apps, which simplifies managing access and automating access requests.
  • Reviewers experienced issues with the command part needing improvement to run multiple commands on multiple devices, limitations on some new EDR software, and a lack of robustness in device management compared to other tools.
JumpCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
899
Device Management
703
Security
524
Integrations
522
User Management
449
Cons
Missing Features
356
Improvement Needed
284
Limited Features
228
UX Improvement
158
Limitations
155
JumpCloud features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.5
Reporting
Average: 8.8
8.4
Approval Workflows
Average: 8.7
8.6
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Louisville, CO
Twitter
@JumpCloud
36,605 Twitter followers
LinkedIn® Page
www.linkedin.com
918 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(73)4.8 out of 5
2nd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

    Users
    • Information Security Analyst
    Industries
    • Telecommunications
    • Government Administration
    Market Segment
    • 68% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Segura 360° Privilege Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Security
    21
    Customer Support
    12
    Access Management
    9
    Access Control
    5
    Cons
    Expensive
    3
    Steep Learning Curve
    3
    Complex Coding
    2
    Lack of Features
    2
    Limited Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    9.4
    Approval Workflows
    Average: 8.7
    9.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Segura
    Year Founded
    2010
    HQ Location
    São Paulo, São Paulo
    LinkedIn® Page
    www.linkedin.com
    271 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Segura (formerly senhasegura) is an identity security company focused on Privileged Access Management (PAM). Its platform is designed to support IT teams managing complex identity security needs, help

Users
  • Information Security Analyst
Industries
  • Telecommunications
  • Government Administration
Market Segment
  • 68% Enterprise
  • 22% Mid-Market
Segura 360° Privilege Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Security
21
Customer Support
12
Access Management
9
Access Control
5
Cons
Expensive
3
Steep Learning Curve
3
Complex Coding
2
Lack of Features
2
Limited Reporting
2
Segura 360° Privilege Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
9.4
Approval Workflows
Average: 8.7
9.4
Audit log
Average: 8.7
Seller Details
Seller
Segura
Year Founded
2010
HQ Location
São Paulo, São Paulo
LinkedIn® Page
www.linkedin.com
271 employees on LinkedIn®
(47)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

    Users
    • Cloud Operations Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SSH PrivX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Security
    15
    Secure Access
    11
    Customer Support
    8
    Accessibility
    7
    Cons
    Integration Difficulty
    12
    Complex Setup
    9
    Limited OS Compatibility
    4
    Poor Documentation
    4
    UX Improvement
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SSH PrivX features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    7.9
    Reporting
    Average: 8.8
    8.5
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1995
    HQ Location
    Helsinki, FI
    Twitter
    @SSH
    3,377 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    523 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PrivX is a Privileged Access Management (PAM) solution designed to help organizations secure and manage access to sensitive systems and data across hybrid and multi-cloud environments. As cyber threat

Users
  • Cloud Operations Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 28% Mid-Market
SSH PrivX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Security
15
Secure Access
11
Customer Support
8
Accessibility
7
Cons
Integration Difficulty
12
Complex Setup
9
Limited OS Compatibility
4
Poor Documentation
4
UX Improvement
4
SSH PrivX features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
7.9
Reporting
Average: 8.8
8.5
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,377 Twitter followers
LinkedIn® Page
www.linkedin.com
523 employees on LinkedIn®
(370)4.7 out of 5
4th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

    Users
    • IT Manager
    • System Administrator
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 48% Enterprise
    • 35% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BeyondTrust Remote Support is a tool that provides remote access for troubleshooting and testing purposes.
    • Users like the ease of use, quick connection to user systems, the ability to access unattended devices, and the security features such as encryption and extensive logging.
    • Users reported issues with the outdated interface, slow response time when creating a support ticket, difficulty in retrieving data and video, and the high cost of the product.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Remote Support Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    31
    Remote Access
    31
    Remote Support
    19
    Security
    19
    Security Focus
    19
    Cons
    Expensive
    16
    Pricing Issues
    8
    Remote Access Issues
    6
    Complexity
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Remote Support features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    9.1
    Reporting
    Average: 8.8
    7.6
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,348 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,696 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for ser

Users
  • IT Manager
  • System Administrator
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 48% Enterprise
  • 35% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BeyondTrust Remote Support is a tool that provides remote access for troubleshooting and testing purposes.
  • Users like the ease of use, quick connection to user systems, the ability to access unattended devices, and the security features such as encryption and extensive logging.
  • Users reported issues with the outdated interface, slow response time when creating a support ticket, difficulty in retrieving data and video, and the high cost of the product.
BeyondTrust Remote Support Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
31
Remote Access
31
Remote Support
19
Security
19
Security Focus
19
Cons
Expensive
16
Pricing Issues
8
Remote Access Issues
6
Complexity
5
Learning Curve
5
BeyondTrust Remote Support features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
9.1
Reporting
Average: 8.8
7.6
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,348 Twitter followers
LinkedIn® Page
www.linkedin.com
1,696 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Password Safe Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    10
    Secure Access
    9
    Auditing
    8
    Password Management
    7
    Cons
    Complex Setup
    6
    Expensive
    3
    Poor Reporting
    3
    Setup Difficulty
    3
    Complex Usage
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Password Safe features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Reporting
    Average: 8.8
    8.6
    Approval Workflows
    Average: 8.7
    8.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,696 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Password Safe automatically protects and manages sensitive assets and more by securely discovering, storing, managing, rotating and controlling access to privileged account passwords and s

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
BeyondTrust Password Safe Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
10
Secure Access
9
Auditing
8
Password Management
7
Cons
Complex Setup
6
Expensive
3
Poor Reporting
3
Setup Difficulty
3
Complex Usage
2
BeyondTrust Password Safe features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.6
Reporting
Average: 8.8
8.6
Approval Workflows
Average: 8.7
8.4
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,354 Twitter followers
LinkedIn® Page
www.linkedin.com
1,696 employees on LinkedIn®
(3,868)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Privileged Access Management (PAM) software
View top Consulting Services for Salesforce Platform
Save to My Lists
Entry Level Price:$25 /user/month* (bil...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

    Users
    • Salesforce Developer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 34% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Salesforce Platform is a customizable and flexible tool that empowers users to reduce IT backlogs and streamline operations through low-code tools and automation.
    • Reviewers frequently mention the platform's powerful automation tools, robust reporting capabilities, and seamless integration with other tools, which enhance efficiency and decision-making accuracy.
    • Reviewers mentioned the initial setup and configuration process can be complex and overwhelming for new users, and the platform's extensive features and updates can sometimes feel too complex and time-consuming to learn.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1,531
    Features
    741
    Customizability
    622
    Customization
    619
    Customization Options
    580
    Cons
    Learning Curve
    536
    Complexity
    490
    Expensive
    456
    Difficult Learning
    387
    Missing Features
    379
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    577,838 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,064 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Platform is the leading low-code development platform that empowers your team to build and extend your Customer 360 with AI, automation, and data. With the Salesforce Platform, you can exec

Users
  • Salesforce Developer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 34% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Salesforce Platform is a customizable and flexible tool that empowers users to reduce IT backlogs and streamline operations through low-code tools and automation.
  • Reviewers frequently mention the platform's powerful automation tools, robust reporting capabilities, and seamless integration with other tools, which enhance efficiency and decision-making accuracy.
  • Reviewers mentioned the initial setup and configuration process can be complex and overwhelming for new users, and the platform's extensive features and updates can sometimes feel too complex and time-consuming to learn.
Salesforce Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1,531
Features
741
Customizability
622
Customization
619
Customization Options
580
Cons
Learning Curve
536
Complexity
490
Expensive
456
Difficult Learning
387
Missing Features
379
Salesforce Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
577,838 Twitter followers
LinkedIn® Page
www.linkedin.com
86,064 employees on LinkedIn®
(23)4.1 out of 5
12th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 52% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Endpoint Privilege Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Accessibility
    3
    Security
    3
    Auditing
    2
    Ease of Configuration
    2
    Cons
    Setup Difficulty
    2
    Difficult Learning
    1
    Expensive
    1
    Implementation Difficulty
    1
    Integration Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,348 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,696 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Endpoint Privilege Management (EPM) empowers organizations to enhance security, streamline compliance, and reduce operational complexity by centralizing policy control and compliance repor

Users
No information available
Industries
No information available
Market Segment
  • 52% Enterprise
  • 43% Mid-Market
BeyondTrust Endpoint Privilege Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Accessibility
3
Security
3
Auditing
2
Ease of Configuration
2
Cons
Setup Difficulty
2
Difficult Learning
1
Expensive
1
Implementation Difficulty
1
Integration Difficulty
1
BeyondTrust Endpoint Privilege Management features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,348 Twitter followers
LinkedIn® Page
www.linkedin.com
1,696 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ping Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Management
    1
    Customer Support
    1
    Ease of Use
    1
    Identity Management
    1
    Integrations
    1
    Cons
    Authentication Issues
    1
    Complex Administration
    1
    Complex Setup
    1
    Confusing Interface
    1
    Confusing Options
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ping Identity features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.8
    9.2
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,259 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The P

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Ping Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Management
1
Customer Support
1
Ease of Use
1
Identity Management
1
Integrations
1
Cons
Authentication Issues
1
Complex Administration
1
Complex Setup
1
Confusing Interface
1
Confusing Options
1
Ping Identity features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.8
9.2
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,218 Twitter followers
LinkedIn® Page
www.linkedin.com
2,259 employees on LinkedIn®
(26)4.4 out of 5
13th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

    Users
    No information available
    Industries
    • Accounting
    Market Segment
    • 81% Enterprise
    • 15% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PingAccess features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Reporting
    Average: 8.8
    8.7
    Approval Workflows
    Average: 8.7
    8.5
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Denver, CO
    Twitter
    @pingidentity
    42,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,259 employees on LinkedIn®
    Phone
    1.303.468.2900
Product Description
How are these determined?Information
This description is provided by the seller.

PingAccess is an identity-enabled access management solution designed to secure web applications and APIs by enforcing comprehensive security policies on client requests. It integrates seamlessly with

Users
No information available
Industries
  • Accounting
Market Segment
  • 81% Enterprise
  • 15% Small-Business
PingAccess features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.6
Reporting
Average: 8.8
8.7
Approval Workflows
Average: 8.7
8.5
Audit log
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Denver, CO
Twitter
@pingidentity
42,218 Twitter followers
LinkedIn® Page
www.linkedin.com
2,259 employees on LinkedIn®
Phone
1.303.468.2900
(58)4.5 out of 5
14th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Privileged Remote Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Secure Access
    7
    Remote Access
    6
    Security
    6
    Ease of Use
    5
    Access Control
    4
    Cons
    Access Control
    2
    Poor Navigation
    2
    Poor Reporting
    2
    Steep Learning Curve
    2
    UX Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.7
    9.1
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,348 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,696 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and O

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 40% Enterprise
BeyondTrust Privileged Remote Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Secure Access
7
Remote Access
6
Security
6
Ease of Use
5
Access Control
4
Cons
Access Control
2
Poor Navigation
2
Poor Reporting
2
Steep Learning Curve
2
UX Improvement
2
BeyondTrust Privileged Remote Access features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.8
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.7
9.1
Audit log
Average: 8.7
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,348 Twitter followers
LinkedIn® Page
www.linkedin.com
1,696 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 88% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Privileged Access Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Connectivity
    2
    Integrations
    2
    Security
    2
    Solution Integration
    2
    Cons
    Integration Difficulty
    2
    Integration Issues
    2
    Poor Customer Support
    2
    Authentication Issues
    1
    Complex Hierarchy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.1
    Reporting
    Average: 8.8
    8.8
    Approval Workflows
    Average: 8.7
    9.2
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,022 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workfor

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 88% Enterprise
  • 33% Mid-Market
CyberArk Privileged Access Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Connectivity
2
Integrations
2
Security
2
Solution Integration
2
Cons
Integration Difficulty
2
Integration Issues
2
Poor Customer Support
2
Authentication Issues
1
Complex Hierarchy
1
CyberArk Privileged Access Manager features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.1
Reporting
Average: 8.8
8.8
Approval Workflows
Average: 8.7
9.2
Audit log
Average: 8.7
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,655 Twitter followers
LinkedIn® Page
www.linkedin.com
5,022 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization's IT infrastructure. By implementing ARCON | P

    Users
    • Consultant
    Industries
    • Information Technology and Services
    • Insurance
    Market Segment
    • 56% Mid-Market
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    7.1
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    7.4
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Arcon
    Year Founded
    2006
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @ARCONRiskCtrl
    1,105 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    832 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARCON | Privileged Access Management (PAM) is a comprehensive solution designed to secure, manage, and monitor privileged accounts within an organization's IT infrastructure. By implementing ARCON | P

Users
  • Consultant
Industries
  • Information Technology and Services
  • Insurance
Market Segment
  • 56% Mid-Market
  • 40% Enterprise
ARCON | Privileged Access Management (PAM) features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
7.1
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
7.4
Audit log
Average: 8.7
Seller Details
Seller
Arcon
Year Founded
2006
HQ Location
Mumbai, Maharashtra
Twitter
@ARCONRiskCtrl
1,105 Twitter followers
LinkedIn® Page
www.linkedin.com
832 employees on LinkedIn®
(41)4.4 out of 5
View top Consulting Services for Delinea Secret Server
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Secret Server Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Password Management
    1
    Security
    1
    Cons
    Complex Usage
    1
    Expensive
    1
    Password Issues
    1
    Poor Customer Support
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Secret Server features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Reporting
    Average: 8.8
    8.2
    Approval Workflows
    Average: 8.7
    9.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    856 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,164 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Secret Server is a comprehensive, feature-rich Privileged Access Management (PAM) solution that quickly identifies, secures, manages, monitors, and audits privileged accounts. Our award-winni

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Mid-Market
  • 29% Enterprise
Delinea Secret Server Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Password Management
1
Security
1
Cons
Complex Usage
1
Expensive
1
Password Issues
1
Poor Customer Support
1
Setup Difficulty
1
Delinea Secret Server features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
8.8
Reporting
Average: 8.8
8.2
Approval Workflows
Average: 8.7
9.0
Audit log
Average: 8.7
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
856 Twitter followers
LinkedIn® Page
www.linkedin.com
1,164 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Devolutions Remote Desktop Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Mobile Compatibility
    3
    Password Management
    3
    Remote Access
    3
    Cross-Platform
    2
    Customer Support
    2
    Cons
    Delay Issues
    1
    Integration Difficulty
    1
    Learning Curve
    1
    Pricing Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    8.8
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,233 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    218 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IT teams often juggle a patchwork of RDP (Remote Desktop Protocol) apps, SSH (Secure Shell) clients, and scattered password vaults. Remote Desktop Manager (RDM) turns that sprawl into one searchable i

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Small-Business
  • 40% Mid-Market
Devolutions Remote Desktop Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Mobile Compatibility
3
Password Management
3
Remote Access
3
Cross-Platform
2
Customer Support
2
Cons
Delay Issues
1
Integration Difficulty
1
Learning Curve
1
Pricing Issues
1
Slow Performance
1
Devolutions Remote Desktop Manager features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
8.8
Audit log
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,233 Twitter followers
LinkedIn® Page
www.linkedin.com
218 employees on LinkedIn®