Best Software for 2025 is now live!

Top Free Privileged Access Management (PAM) Software - Page 2

Check out our list of free Privileged Access Management (PAM) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Privileged Access Management (PAM) Software to ensure you get the right product.

View Free Privileged Access Management (PAM) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
41 Privileged Access Management (PAM) Products Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delinea Cloud Suite is a unified PAM platform for managing privileged access in multi-cloud infrastructure to seamlessly secure access and protect against identity-based cyberattacks. Cloud Suite sup

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Enterprise
    • 45% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Cloud Suite features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Non-Profit Organization Management
    AN
    I think the most helpful part of Centrify Zero Trust is how simple it was to setup. We were looking at one of their major competitors, and they... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,143 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delinea Cloud Suite is a unified PAM platform for managing privileged access in multi-cloud infrastructure to seamlessly secure access and protect against identity-based cyberattacks. Cloud Suite sup

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Enterprise
  • 45% Mid-Market
Delinea Cloud Suite features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Verified User in Non-Profit Organization Management
AN
I think the most helpful part of Centrify Zero Trust is how simple it was to setup. We were looking at one of their major competitors, and they... Read review
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
757 Twitter followers
LinkedIn® Page
www.linkedin.com
1,143 employees on LinkedIn®
(21)4.7 out of 5
3rd Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Reporting
    Average: 8.6
    9.2
    Approval Workflows
    Average: 8.6
    9.5
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Leisure, Travel & Tourism
    AL
    Simple to use, monitoring and alerts help us identify users that require extra training, recordings help us minimize efforts to troubleshoot apps... Read review
    Verified User in Information Technology and Services
    AI
    I really like this tool, because it сan do anything you need regarding the network security, granting accesses to different categories of users,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Needham, MA
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Mid-Market
  • 33% Small-Business
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.4
Reporting
Average: 8.6
9.2
Approval Workflows
Average: 8.6
9.5
Audit log
Average: 8.6
Verified User in Leisure, Travel & Tourism
AL
Simple to use, monitoring and alerts help us identify users that require extra training, recordings help us minimize efforts to troubleshoot apps... Read review
Verified User in Information Technology and Services
AI
I really like this tool, because it сan do anything you need regarding the network security, granting accesses to different categories of users,... Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Needham, MA
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(11)4.8 out of 5
9th Easiest To Use in Privileged Access Management (PAM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    9.4
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    It allows us to reference permission check out links directly, allowing for auto reponses to our users and freeing up time for our internal support... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entitle
    Company Website
    Year Founded
    2021
    HQ Location
    New York, NY
    Twitter
    @EntitleIO
    83 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 18% Enterprise
BeyondTrust Entitle Just-in-Time Access features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
9.4
Audit log
Average: 8.6
Verified User in Computer Software
AC
It allows us to reference permission check out links directly, allowing for auto reponses to our users and freeing up time for our internal support... Read review
Seller Details
Seller
Entitle
Company Website
Year Founded
2021
HQ Location
New York, NY
Twitter
@EntitleIO
83 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

    Users
    • CTO
    Industries
    • Computer Software
    Market Segment
    • 84% Small-Business
    • 16% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Doppler secrets management platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.6
    6.7
    Approval Workflows
    Average: 8.6
    6.7
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Harrison H.
    HH
    Simple UI, intuitive, environments, sync with git, what's not to like? Read review
    Verified User in Information Technology and Services
    AI
    Doppler has been the most profitable purchase of the last 2 years in the company where I work. We've been using it for 2 years now, and it enables... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Doppler
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @doppler
    1,243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Doppler is a centralized, secure secrets management platform tailored for DevOps engineers and CTOs at mid-market and enterprise companies. Secrets sprawl and fragmented processes can create significa

Users
  • CTO
Industries
  • Computer Software
Market Segment
  • 84% Small-Business
  • 16% Mid-Market
Doppler secrets management platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.6
6.7
Approval Workflows
Average: 8.6
6.7
Audit log
Average: 8.6
Harrison H.
HH
Simple UI, intuitive, environments, sync with git, what's not to like? Read review
Verified User in Information Technology and Services
AI
Doppler has been the most profitable purchase of the last 2 years in the company where I work. We've been using it for 2 years now, and it enables... Read review
Seller Details
Seller
Doppler
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@doppler
1,243 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 62% Mid-Market
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Heimdal® features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    9.4
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Glass, Ceramics & Concrete
    AG
    The interface is simple compared to other AV software and software patch management. Read review
    KK
    I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Heimdal®
    Year Founded
    2014
    HQ Location
    Copenhagen, Denmark
    Twitter
    @HeimdalSecurity
    5,191 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Heimdal® is a fast-growing cybersecurity company focused on continuous technological innovation. Since its establishment in 2014 in Copenhagen, based on the winning idea of CTF World Champions, Heimda

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 62% Mid-Market
  • 31% Small-Business
Heimdal® features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
9.4
Audit log
Average: 8.6
Verified User in Glass, Ceramics & Concrete
AG
The interface is simple compared to other AV software and software patch management. Read review
KK
I like that many application is bundled in one application, making it easy to administrate and very effective. Effective means saving time and money. Read review
Seller Details
Seller
Heimdal®
Year Founded
2014
HQ Location
Copenhagen, Denmark
Twitter
@HeimdalSecurity
5,191 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every indiv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 93% Enterprise
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saviynt features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.6
    9.2
    Approval Workflows
    Average: 8.6
    7.9
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AA
    Business friendly product. Light weight. Read review
    Verified User in Financial Services
    CF
    Product features are exceptional and best in their field. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Saviynt
    Company Website
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @saviynt
    1,156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,089 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every indiv

Users
No information available
Industries
No information available
Market Segment
  • 93% Enterprise
  • 7% Mid-Market
Saviynt features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.6
9.2
Approval Workflows
Average: 8.6
7.9
Audit log
Average: 8.6
AA
Business friendly product. Light weight. Read review
Verified User in Financial Services
CF
Product features are exceptional and best in their field. Read review
Seller Details
Seller
Saviynt
Company Website
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@saviynt
1,156 Twitter followers
LinkedIn® Page
www.linkedin.com
1,089 employees on LinkedIn®
(13)4.8 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dispel features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Biotechnology
    AB
    Responsive, US-based support team. Pilot implementation was painless and it was easy to demonstrate value to management. Security standards are... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dispel
    Company Website
    Year Founded
    2014
    HQ Location
    Austin, TX
    Twitter
    @dispelhq
    725 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
Dispel features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Verified User in Biotechnology
AB
Responsive, US-based support team. Pilot implementation was painless and it was easy to demonstrate value to management. Security standards are... Read review
Seller Details
Seller
Dispel
Company Website
Year Founded
2014
HQ Location
Austin, TX
Twitter
@dispelhq
725 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AutoElevate™ is a PAM solution that cost effectively allows you to remove local Admin rights and secure your clients with least privilege without frustrating your end users. With the AutoElevate Privi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AutoElevate features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.6
    9.6
    Approval Workflows
    Average: 8.6
    9.2
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Non-Profit Organization Management
    UN
    AutoElevate is convenient to use with a smart phone. It is a great safeguard for IT admin computers and monitoring. Read review
    Verified User in Computer & Network Security
    UC
    It stops users from being able to execute programs without permission cutting down on the risk of harmful applications being installed on the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberFOX
    Year Founded
    2022
    HQ Location
    Tampa, FL
    Twitter
    @CyberFoxLLC
    132 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AutoElevate™ is a PAM solution that cost effectively allows you to remove local Admin rights and secure your clients with least privilege without frustrating your end users. With the AutoElevate Privi

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
AutoElevate features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.6
9.6
Approval Workflows
Average: 8.6
9.2
Audit log
Average: 8.6
Verified User in Non-Profit Organization Management
UN
AutoElevate is convenient to use with a smart phone. It is a great safeguard for IT admin computers and monitoring. Read review
Verified User in Computer & Network Security
UC
It stops users from being able to execute programs without permission cutting down on the risk of harmful applications being installed on the... Read review
Seller Details
Seller
CyberFOX
Year Founded
2022
HQ Location
Tampa, FL
Twitter
@CyberFoxLLC
132 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
(10)4.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okera features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.6
    8.3
    Approval Workflows
    Average: 8.6
    8.9
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Max J.
    MJ
    It is important to be sure that all data is protected free from any attack that may affect the proper functioning of the company. The option to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okera
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @okerainc
    405 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Enterprise
Okera features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.6
8.3
Approval Workflows
Average: 8.6
8.9
Audit log
Average: 8.6
Max J.
MJ
It is important to be sure that all data is protected free from any attack that may affect the proper functioning of the company. The option to... Read review
Seller Details
Seller
Okera
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@okerainc
405 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
Entry Level Price:$499.99
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Devolutions Server is a self-hosted shared account and credential management solution designed to assist organizations in securely managing their sensitive information, such as passwords and access cr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Devolutions Server features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    0.0
    No information available
    10.0
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Stian S.
    SS
    The most helpful thing about the DVSL is that it is easy to configure, easy to use and covers the needs for password management everywhere you are.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Lavaltrie, Quebec
    Twitter
    @DevolutionsInc
    1,167 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    192 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Devolutions Server is a self-hosted shared account and credential management solution designed to assist organizations in securely managing their sensitive information, such as passwords and access cr

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Devolutions Server features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
0.0
No information available
10.0
Audit log
Average: 8.6
Stian S.
SS
The most helpful thing about the DVSL is that it is easy to configure, easy to use and covers the needs for password management everywhere you are.... Read review
Seller Details
Year Founded
2010
HQ Location
Lavaltrie, Quebec
Twitter
@DevolutionsInc
1,167 Twitter followers
LinkedIn® Page
www.linkedin.com
192 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ricardo P.
    RP
    I got answers for every question, during trial and afterwards. Support was fast and efficient. PAM got our own passwords safe and gave us a single,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Newark, Delaware
    LinkedIn® Page
    www.linkedin.com
    104 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securden Unified PAM is an all in one privileged access governance suite that helps manage privileged identities spread across your IT network devices like endpoints, servers, routers, and switches an

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Securden Privileged Account Manager (PAM) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Ricardo P.
RP
I got answers for every question, during trial and afterwards. Support was fast and efficient. PAM got our own passwords safe and gave us a single,... Read review
Seller Details
Year Founded
2018
HQ Location
Newark, Delaware
LinkedIn® Page
www.linkedin.com
104 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Reporting
    Average: 8.6
    6.7
    Approval Workflows
    Average: 8.6
    5.8
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AG
    I like the revoked permissions of users that I don't want to be on the list, when I write the command line and send the request to the server the... Read review
    OO
    Data organizer by GUI, web and PC data redundancy, local server to the Internet. Folders and sync Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smallstep
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @smallsteplabs
    1,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Reporting
Average: 8.6
6.7
Approval Workflows
Average: 8.6
5.8
Audit log
Average: 8.6
AG
I like the revoked permissions of users that I don't want to be on the list, when I write the command line and send the request to the server the... Read review
OO
Data organizer by GUI, web and PC data redundancy, local server to the Internet. Folders and sync Read review
Seller Details
Seller
Smallstep
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@smallsteplabs
1,527 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.6
    0.0
    No information available
    8.3
    Audit log
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Higher Education
    UH
    This was an important resource for our company, especially in order to protect many confidential files and information. Read review
    AL
    UserLock is a very simple and self-explanatory software. Once set up, it does its job without having to change anything. I have tested several... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Mid-Market
UserLock features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.6
0.0
No information available
8.3
Audit log
Average: 8.6
Verified User in Higher Education
UH
This was an important resource for our company, especially in order to protect many confidential files and information. Read review
AL
UserLock is a very simple and self-explanatory software. Once set up, it does its job without having to change anything. I have tested several... Read review
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Thiago O.
    TO
    #1 is speed and ease of implementation. - Adaptive Used for dynamic data masking, real-time activity monitoring, non-human identity management,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Thiago O.
TO
#1 is speed and ease of implementation. - Adaptive Used for dynamic data masking, real-time activity monitoring, non-human identity management,... Read review
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
(1)5.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Formal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    AF
    Formal gives me something others tools dont - actual control of my data. Instead of just telling me where my data is and classifying it (it does... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Formal
Product Description
How are these determined?Information
This description is provided by the seller.

Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Formal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Financial Services
AF
Formal gives me something others tools dont - actual control of my data. Instead of just telling me where my data is and classifying it (it does... Read review
Seller Details
Seller
Formal