PingAccess Features
What are the features of PingAccess?
Functionality
- Multi-Factor Authentication
- Single Sign-On
- Password Vault
- Role-based security
- Live notifications
- Temporary, time-limited privilege
Administration
- Policy, User, and Role Management
- Approval Workflows
- Automated Provisioning
Reporting
- Reporting
Top Rated PingAccess Alternatives
(13)
3.9 out of 5
Visit Website
Sponsored
PingAccess Categories on G2
Filter for Features
Functionality
Multi-Factor Authentication | As reported in 16 PingAccess reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | 90% (Based on 16 reviews) | |
Single Sign-On | Based on 15 PingAccess reviews. Provides a single access point for users to access multiple cloud products without multiple logins. | 92% (Based on 15 reviews) | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | Based on 14 PingAccess reviews. Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | 87% (Based on 14 reviews) | |
Centralized management | Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | Not enough data | |
Role-based security | Allows privileges based on roles, such as business unit or other factors. 13 reviewers of PingAccess have provided feedback on this feature. | 85% (Based on 13 reviews) | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. 11 reviewers of PingAccess have provided feedback on this feature. | 86% (Based on 11 reviews) | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers | Not enough data | |
Temporary, time-limited privilege | As reported in 13 PingAccess reviews. Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | 85% (Based on 13 reviews) |
Monitoring
Audit Logging | Provides audit logs for compliance reasons. | Not enough data | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. | Not enough data | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data |
Administration
Policy, User, and Role Management | Based on 13 PingAccess reviews. Creates access requirements and standards and establishes user, roles, and access rights. | 87% (Based on 13 reviews) | |
Approval Workflows | As reported in 10 PingAccess reviews. Allows administrators to approve or reject access changes to using defined workflows. | 87% (Based on 10 reviews) | |
Automated Provisioning | As reported in 12 PingAccess reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | 81% (Based on 12 reviews) | |
Bulk Changes | Reduces manual administrative work. | Not enough data | |
Centralized Management | Manages identity information from on-premise and cloud applications. | Not enough data | |
Self-Service Access Requests | Automatically allows access if users meet policy requirements. | Not enough data |
Reporting
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. | Not enough data | |
Reporting | Includes reporting functionality. 12 reviewers of PingAccess have provided feedback on this feature. | 86% (Based on 12 reviews) |