Introducing G2.ai, the future of software buying.Try now

Best Privileged Access Management (PAM) Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Privileged access management (PAM) software helps companies protect the “keys to their IT kingdom" by ensuring the credentials of their privileged accounts, such as admin accounts on critical company assets, are only accessed by those with proper permissions to do so. PAM software helps prevent external hacking or internal misuse of important company assets by employing “least privilege access" policies, wherein users receive the absolute minimum access needed to perform their duties.

PAM software allows companies to secure their privileged credentials in a centralized, secure vault (a password safe). Additionally, these solutions control who has access to, and therefore who can use, the privileged credentials based on access policies (including user permissions and specific timeframes), often recording or logging user activity while using the credentials. When a user checks out a credential, it stops other users from opening a concurrent session; this means only one person can access the privileged account at one time.

PAM solutions are used in conjunction with identity and access management (IAM) software, which provides authentication of general user identities; PAM software, however, provides more granular control and visibility of administrative or privileged user identities. While there is some similarity between the secure vaults within both password managers and PAM tools, the two software types are quite different. Password managers are designed to protect everyday users’ passwords, while PAM software protects a company’s super users, shared company accounts, and service accounts by offering centralized control, visability, and monitoring of the use of those privileged accounts.

To qualify for inclusion in the Privileged Access Management category, a product must:

Allow administrators to create and provision privileged access accounts
Offer a secure vault to store privileged credentials or provision users with just-in-time access
Monitor, record, and log user actions while using privileged accounts
Show More
Show Less

Featured Privileged Access Management (PAM) Software At A Glance

Free Plan Available:
Heimdal
Sponsored
Leader:
Easiest to Use:
Show LessShow More

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
153 Listings in Privileged Access Management (PAM) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hitachi ID Privileged Access Manager features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Calgary, CA
    Twitter
    @OneBravura
    936 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
    Phone
    1-403-223-0740
Product Description
How are these determined?Information
This description is provided by the seller.

Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Hitachi ID Privileged Access Manager features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Year Founded
1992
HQ Location
Calgary, CA
Twitter
@OneBravura
936 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
Phone
1-403-223-0740
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okera features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    8.9
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okera
    Year Founded
    2016
    HQ Location
    San Francisco, CA
    Twitter
    @okerainc
    389 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okera, the universal data authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and enforce compliance with data privacy regulations. The Ok

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Enterprise
Okera features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
8.9
Audit log
Average: 8.7
Seller Details
Seller
Okera
Year Founded
2016
HQ Location
San Francisco, CA
Twitter
@okerainc
389 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 67% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Identity and Access Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,620 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23,270 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 67% Enterprise
OpenText Identity and Access Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,620 Twitter followers
LinkedIn® Page
www.linkedin.com
23,270 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

    Users
    No information available
    Industries
    • Primary/Secondary Education
    Market Segment
    • 50% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RapidIdentity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    6.7
    Approval Workflows
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Houston, US
    Twitter
    @identityauto
    607 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RapidIdentity is an identity management software that helps organizations embrace security, increase business agility, and deliver an enhanced user experience.

Users
No information available
Industries
  • Primary/Secondary Education
Market Segment
  • 50% Enterprise
  • 30% Mid-Market
RapidIdentity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
6.7
Approval Workflows
Average: 8.7
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Houston, US
Twitter
@identityauto
607 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure compute is an on-demand computing service for running cloud-based applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 42% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Compute features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,087,439 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure compute is an on-demand computing service for running cloud-based applications.

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 42% Enterprise
Azure Compute features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,087,439 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • EmpowerID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Cloud Services
    1
    Customer Support
    1
    Device Management
    1
    Ease of Implementation
    1
    Cons
    Difficult Integration
    1
    Integration Difficulty
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EmpowerID features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    EmpowerID
    Year Founded
    2005
    HQ Location
    Dublin, US
    Twitter
    @EmpowerID
    390 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    88 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
EmpowerID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Cloud Services
1
Customer Support
1
Device Management
1
Ease of Implementation
1
Cons
Difficult Integration
1
Integration Difficulty
1
Integration Issues
1
EmpowerID features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
EmpowerID
Year Founded
2005
HQ Location
Dublin, US
Twitter
@EmpowerID
390 Twitter followers
LinkedIn® Page
www.linkedin.com
88 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReShield is an advanced Identity and Access Governance solution designed for companies looking to seamlessly secure and manage access to their critical data and infrastructure. It simplifies identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReShield features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    10.0
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ReShield
    Year Founded
    2023
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReShield is an advanced Identity and Access Governance solution designed for companies looking to seamlessly secure and manage access to their critical data and infrastructure. It simplifies identity

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ReShield features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
10.0
Audit log
Average: 8.7
Seller Details
Seller
ReShield
Year Founded
2023
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission-based system for a smooth employee experience. Discover a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securden Endpoint Privilege Manager features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Newark, Delaware
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission-based system for a smooth employee experience. Discover a

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Securden Endpoint Privilege Manager features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Newark, Delaware
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UserLock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Setup
    2
    Setup Ease
    2
    2FA Security
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Authentication Issues
    1
    Lack of Customization
    1
    Limited Features
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UserLock features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.8
    0.0
    No information available
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    BIDART, Aquitaine
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UserLock delivers Identity & Access Management (IAM) for organizations built on Microsoft Active Directory. It protects logins to corporate networks and SaaS applications across hybrid, remote, an

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 25% Mid-Market
UserLock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Setup
2
Setup Ease
2
2FA Security
1
Customer Support
1
Cons
Access Issues
1
Authentication Issues
1
Lack of Customization
1
Limited Features
1
Limited OS Compatibility
1
UserLock features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.8
0.0
No information available
8.3
Audit log
Average: 8.7
Seller Details
Year Founded
2000
HQ Location
BIDART, Aquitaine
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 2AB iLock Security Services features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.8
    8.3
    Approval Workflows
    Average: 8.7
    6.7
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    2AB
    Year Founded
    1997
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applica

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
2AB iLock Security Services features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.8
8.3
Approval Workflows
Average: 8.7
6.7
Audit log
Average: 8.7
Seller Details
Seller
2AB
Year Founded
1997
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adaptive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Automation
    1
    Customization Features
    1
    Data Protection
    1
    Ease
    1
    Cons
    Data Privacy
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Automation
1
Customization Features
1
Data Protection
1
Ease
1
Cons
Data Privacy
1
Expensive
1
Adaptive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AuthNull Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    MFA Security
    1
    Security
    1
    Cons
    Lack of Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthNull features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authnull
    Year Founded
    2023
    HQ Location
    California, US
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthNull is a cutting-edge cybersecurity software company specializing in Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) solutions. Our innovative platform streamlines access

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
AuthNull Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
MFA Security
1
Security
1
Cons
Lack of Features
1
AuthNull features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Authnull
Year Founded
2023
HQ Location
California, US
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Core Access Insight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Core Access Insight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,569 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bri

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Core Access Insight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Poor Customer Support
1
Core Access Insight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,569 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyberelements features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Systancia
    Year Founded
    1998
    HQ Location
    Sausheim, FR
    Twitter
    @Systancia
    746 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cyberelements is the security platform for business performance. It is the only SaaS solution allowing you to enable your Zero Trust PAM (Privileged Access Management) in 3 mins. With cyberelements yo

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
cyberelements features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Systancia
Year Founded
1998
HQ Location
Sausheim, FR
Twitter
@Systancia
746 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Remote Shielded Workspace (RSW) to Protect IT and OT Environments Endurance is a cybersecurity solution that simplifies and strengthens the protection, control, and management of digital assets for or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Endurance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Endurance features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.8
    10.0
    Approval Workflows
    Average: 8.7
    8.3
    Audit log
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cosmikal
    Year Founded
    2013
    HQ Location
    Santander, ES
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
    Phone
    +34 942 94 73 85
Product Description
How are these determined?Information
This description is provided by the seller.

Remote Shielded Workspace (RSW) to Protect IT and OT Environments Endurance is a cybersecurity solution that simplifies and strengthens the protection, control, and management of digital assets for or

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Endurance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Security
1
Cons
This product has not yet received any negative sentiments.
Endurance features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.8
10.0
Approval Workflows
Average: 8.7
8.3
Audit log
Average: 8.7
Seller Details
Seller
Cosmikal
Year Founded
2013
HQ Location
Santander, ES
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
Phone
+34 942 94 73 85