|| products.size

Best Privileged Access Management (PAM) Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts

Best Privileged Access Management (PAM) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
151 Listings in Privileged Access Management (PAM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Reporting
    Average: 8.6
    6.7
    Approval Workflows
    Average: 8.6
    5.8
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smallstep
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @smallsteplabs
    1,527 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Smallstep SSH delivers an end-to-end workflow that marries modern identity providers (OKTA, Azure AD, ...) with short-lived SSH certificates. Users sign in to your identity provider via OAuth and are

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smallstep Single Sign-on SSH features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Reporting
Average: 8.6
6.7
Approval Workflows
Average: 8.6
5.8
Audit log
Average: 8.6
Seller Details
Seller
Smallstep
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@smallsteplabs
1,527 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    2FA Security
    1
    MFA Security
    1
    Security
    1
    Security Authentication
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.6
    0.0
    No information available
    8.3
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock provides on-premise Active Directory Identities with secure access to corporate networks and multiple cloud applications, from wherever they are working. Enable Multi-Factor Authentication (

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Enterprise
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
2FA Security
1
MFA Security
1
Security
1
Security Authentication
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
UserLock features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.6
0.0
No information available
8.3
Audit log
Average: 8.6
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 2AB iLock Security Services features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.6
    8.3
    Approval Workflows
    Average: 8.6
    6.7
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    2AB
Product Description
How are these determined?Information
This description is provided by the seller.

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
2AB iLock Security Services features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.6
8.3
Approval Workflows
Average: 8.6
6.7
Audit log
Average: 8.6
Seller Details
Seller
2AB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adaptive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Automation
    1
    Customization Features
    1
    Data Protection
    1
    Ease
    1
    Cons
    Data Privacy
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Automation
1
Customization Features
1
Data Protection
1
Ease
1
Cons
Data Privacy
1
Expensive
1
Adaptive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthNull Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    MFA Security
    1
    Security
    1
    Cons
    Lack of Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthNull features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authnull
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthNull Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
MFA Security
1
Security
1
Cons
Lack of Features
1
AuthNull features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Authnull
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,507 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,595 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The BeyondTrust Privileged Remote Access (PRA) cloud-based solution provides comprehensive privileged session management and essential vaulting capabilities for internal, external and third-party priv

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
BeyondTrust Cloud Vault features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,507 Twitter followers
LinkedIn® Page
www.linkedin.com
1,595 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Core Access Insight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Core Access Insight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,407 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,774 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Core Access Insight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Poor Customer Support
1
Core Access Insight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,407 Twitter followers
LinkedIn® Page
www.linkedin.com
1,774 employees on LinkedIn®
(1)5.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Formal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Admin Control
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Formal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Formal
Product Description
How are these determined?Information
This description is provided by the seller.

Over the past decade, the data stack has evolved, bringing new technologies and vulnerabilities. Nowadays, company data is scattered across every type of data store imaginable. This scattered data is

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Formal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Admin Control
1
Security
1
Cons
This product has not yet received any negative sentiments.
Formal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Formal
(1)4.5 out of 5
View top Consulting Services for Krontech Single Connect Privileged Session Manager
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Istanbul, TR
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Single Connect's Privileged Session Manager eliminates the inadequacy of central access control point for critical systems and makes you to gain full control over your sessions.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Krontech Single Connect Privileged Session Manager features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Seller Details
Year Founded
2007
HQ Location
Istanbul, TR
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine PAM360 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    418 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine PAM360 is a robust privileged access management solution to control, manage, and audit the entire life cycle of privileged accounts and their access. It encrypts and consolidates all your

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ManageEngine PAM360 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,655 Twitter followers
LinkedIn® Page
www.linkedin.com
418 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • One Identity Safeguard features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Aliso Viejo, CA
    Twitter
    @Quest
    17,650 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,610 employees on LinkedIn®
    Ownership
    NYSE: DGX
Product Description
How are these determined?Information
This description is provided by the seller.

With One Identity Safeguard for Privileged Sessions, you can control, monitor and record privileged sessions of administrators, remote vendors and other high-risk users. Content of the recorded sessio

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
One Identity Safeguard features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Seller Details
Year Founded
1987
HQ Location
Aliso Viejo, CA
Twitter
@Quest
17,650 Twitter followers
LinkedIn® Page
www.linkedin.com
3,610 employees on LinkedIn®
Ownership
NYSE: DGX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,943 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,114 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus NetIQ Privileged Account Manager (PAM) facilitates administrative access across your complex, hybrid infrastructure. Discover your privileged identities, along with what dependencies exist

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText NetIQ Privileged Account Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,943 Twitter followers
LinkedIn® Page
www.linkedin.com
22,114 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.6
    8.3
    Approval Workflows
    Average: 8.6
    6.7
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
Product Description
How are these determined?Information
This description is provided by the seller.

RevBits Privileged Access Management is a four-in-one solution that includes privileged account, password, key and certificate management, as well as extensive session logging that captures keystrokes

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.6
8.3
Approval Workflows
Average: 8.6
6.7
Audit log
Average: 8.6
Seller Details
HQ Location
N/A
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Privileged Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Flexibility
    1
    Secure Access
    1
    Cons
    Poor User Interface
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privileged Access Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.6
    10.0
    Approval Workflows
    Average: 8.6
    10.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    25 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, de

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Privileged Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Flexibility
1
Secure Access
1
Cons
Poor User Interface
1
Privileged Access Management features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.6
10.0
Approval Workflows
Average: 8.6
10.0
Audit log
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
25 Twitter followers
LinkedIn® Page
www.linkedin.com
393 employees on LinkedIn®
(1)4.5 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QGuard is the leading Privileged Access Management (PAM) solution for Managed Service Providers (MSPs). Designed with a security-first mentality, and the goal to proactively mitigate risk and suppor

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • QGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Ease of Use
    1
    Integrations
    1
    Onboarding
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QGuard features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.6
    0.0
    No information available
    10.0
    Audit log
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberQP
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

QGuard is the leading Privileged Access Management (PAM) solution for Managed Service Providers (MSPs). Designed with a security-first mentality, and the goal to proactively mitigate risk and suppor

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
QGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Ease of Use
1
Integrations
1
Onboarding
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
QGuard features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.6
0.0
No information available
10.0
Audit log
Average: 8.6
Seller Details
Seller
CyberQP
LinkedIn® Page
www.linkedin.com