Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Hitachi ID Privileged Access Manager Alternatives

Hitachi ID Privileged Access Manager Reviews & Product Details

Hitachi ID Privileged Access Manager Overview

What is Hitachi ID Privileged Access Manager?

Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

Hitachi ID Privileged Access Manager Details
Show LessShow More
Product Description

Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications.


Seller Details
Year Founded
1992
HQ Location
Calgary, AB, Canada
Twitter
@OneBravura
951 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
Phone
1-403-223-0740

DM
Overview Provided by:

Recent Hitachi ID Privileged Access Manager Reviews

PP
Prasanth raj P.Enterprise (> 1000 emp.)
5.0 out of 5
"A Necessary Software that simplifies Privileged Access management for your firm"
It easily integrates with your company's authentication. For eg, Our Firm has a recommendation of two factor authentication - LDAP authentication a...
Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"Hitachi ID PAM Tool"
Hitachi ID PAM is able to manage service account credentials, thus reducing IT manual task of resetting passwords and updating to end applications.
Verified User
A
Verified UserMid-Market (51-1000 emp.)
2.0 out of 5
"Hitachi ID as PAM Tool"
It's ability to manage privileged credentials and rotate passwords at regular intervals.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Hitachi ID Privileged Access Manager Media

Hitachi ID Privileged Access Manager Demo - Select managed system and account
When a user needs to gain access to a privileged account on a managed system, the first step is to select the system and account. A searchable, browsable UI is presented for this purpose, as shown here. See more at: https://hitachi-id.com/privileged-access-manager/screens/screen-shots.html
Hitachi ID Privileged Access Manager Demo - Checkout a session
The next step is to checkout a session. Access control rules determine which users are allowed to checkout a session to which accounts on which systems. Alternately, a user can request one-time access (authorized through a workflow process). In either case, concurrency limits may be in place, for...
Hitachi ID Privileged Access Manager Demo - Launch RDP connection
Once a session has been activated, the user can connect. Policy determines what connection options are available -- in this case, there is just one: to launch a remote desktop session. See more at: https://hitachi-id.com/privileged-access-manager/screens/screen-shots.html
Hitachi ID Privileged Access Manager Demo - Manage the system
Using the remote desktop window, the user can do his work. He can close the window and open it again later, so long as his Hitachi ID Privileged Access Manager session has not timed out and been automatically checked back in. See more at: https://hitachi-id.com/privileged-access-manager/screen...
Hitachi ID Privileged Access Manager Demo - Checkin the session
When his work is done, the administrator checks in the session. This typically causes the password to the account he was using to be randomized again and the new value placed in the secure, replicated vault. See more at: https://hitachi-id.com/privileged-access-manager/screens/screen-shots.html
Answer a few questions to help the Hitachi ID Privileged Access Manager community
Have you used Hitachi ID Privileged Access Manager before?
Yes

3 Hitachi ID Privileged Access Manager Reviews

3.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Hitachi ID Privileged Access Manager Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
PP
Application developer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Hitachi ID Privileged Access Manager?

It easily integrates with your company's authentication. For eg, Our Firm has a recommendation of two factor authentication - LDAP authentication and RSA Secure ID token authentication. Thats there for our firm's HiPam as well and I didnt have any issues while logging to HiPAM till date.

It doesnt require any extra software in the client's system for accessing ( In my case Virtual machines). You can always download one-time temporary file that lets you access the machine for a session and its super easy.

If I try to access a VM which is already logged in by other person, it wont allow me and will also send a notification mail saying "this person has logged in currently" and its super helpful. Review collected by and hosted on G2.com.

What do you dislike about Hitachi ID Privileged Access Manager?

Sometimes, when my system is locked for a long time or when there is a network issue in my system for a minute, it quits the entire window. Although it resumes from where I left, It is quite annoying. Review collected by and hosted on G2.com.

What problems is Hitachi ID Privileged Access Manager solving and how is that benefiting you?

Earlier For Accessing VMs, we used to have indiviual login credentials for each access privilege and there can be clashes between the login sessions. There was also a concern for misuse of password sharing. Hitachi PAM is the perfect solution for managing privileged access, allowing users to seemlessly access VMs and also maintain good password hygiene. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Hitachi ID Privileged Access Manager?

Hitachi ID PAM is able to manage service account credentials, thus reducing IT manual task of resetting passwords and updating to end applications. Review collected by and hosted on G2.com.

What do you dislike about Hitachi ID Privileged Access Manager?

Hitachi ID currently do not support management of network devices and their privileged credentials. Review collected by and hosted on G2.com.

What problems is Hitachi ID Privileged Access Manager solving and how is that benefiting you?

reducing IT manual task of resetting passwords and updating to end applications. Hitachi ID PAM can do it on the go Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Hitachi ID Privileged Access Manager?

It's ability to manage privileged credentials and rotate passwords at regular intervals. Review collected by and hosted on G2.com.

What do you dislike about Hitachi ID Privileged Access Manager?

It is not able to update passwords if credentials are being used in hard coded form. Review collected by and hosted on G2.com.

What problems is Hitachi ID Privileged Access Manager solving and how is that benefiting you?

Managing privileged accounts and service accounts which has reduced a lot of manual work. Review collected by and hosted on G2.com.

There are not enough reviews of Hitachi ID Privileged Access Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,051)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(788)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
3
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(346)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
4
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(193)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
5
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
6
Teleport Logo
Teleport
4.5
(104)
The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure.
7
StrongDM Logo
StrongDM
4.7
(84)
strongDM’s People-First Access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability to simplify workflows and make it easier for technical staff to access the tools they need without compromising security and compliance requirements.
8
CyberArk Privileged Access Manager Logo
CyberArk Privileged Access Manager
4.4
(64)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
9
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
10
CloudEagle Logo
CloudEagle
4.7
(71)
CloudEagle is an all-in-one SaaS research, management and procurement platform
Show More