Show rating breakdown
Save to My Lists
Claimed
Claimed

PingAccess Features

What are the features of PingAccess?

Functionality

  • Multi-Factor Authentication
  • Single Sign-On
  • Password Vault
  • Role-based security
  • Live notifications
  • Temporary, time-limited privilege

Administration

  • Policy, User, and Role Management
  • Approval Workflows
  • Automated Provisioning

Reporting

  • Reporting

Top Rated PingAccess Alternatives

Filter for Features

Functionality

Multi-Factor Authentication

As reported in 16 PingAccess reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
90%
(Based on 16 reviews)

Single Sign-On

Based on 15 PingAccess reviews. Provides a single access point for users to access multiple cloud products without multiple logins.
92%
(Based on 15 reviews)

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Based on 14 PingAccess reviews. Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
87%
(Based on 14 reviews)

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors. 13 reviewers of PingAccess have provided feedback on this feature.
85%
(Based on 13 reviews)

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time. 11 reviewers of PingAccess have provided feedback on this feature.
86%
(Based on 11 reviews)

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers

Not enough data

Temporary, time-limited privilege

As reported in 13 PingAccess reviews. Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
85%
(Based on 13 reviews)

Monitoring

Audit Logging

Provides audit logs for compliance reasons.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Administration

Policy, User, and Role Management

Based on 13 PingAccess reviews. Creates access requirements and standards and establishes user, roles, and access rights.
87%
(Based on 13 reviews)

Approval Workflows

As reported in 10 PingAccess reviews. Allows administrators to approve or reject access changes to using defined workflows.
87%
(Based on 10 reviews)

Automated Provisioning

As reported in 12 PingAccess reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
81%
(Based on 12 reviews)

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

Manages identity information from on-premise and cloud applications.

Not enough data

Self-Service Access Requests

Automatically allows access if users meet policy requirements.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.

Not enough data

Reporting

Includes reporting functionality. 12 reviewers of PingAccess have provided feedback on this feature.
86%
(Based on 12 reviews)