Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

SSH PrivX Reviews & Product Details

SSH PrivX Overview

What is SSH PrivX?

PrivX is a scalable, cost-efficient, and highly automated privileged access management (PAM) solution for hybrid and multi-cloud environments, quantum-safe connections and any combination of password vaulting, rotation, and passwordless authentication.

SSH PrivX Details
Product Website
Languages Supported
English
Show LessShow More
Product Description

SSH PrivX allows you to scale securely at the speed of the cloud.


Seller Details
Company Website
Year Founded
1995
HQ Location
Helsinki, FI
Twitter
@SSH
3,390 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
Ownership
HEL: SSH1V
Description

SSH Communications Security is a cybersecurity company specializing in secure access and data protection solutions. Founded in 1995, the company is known for its innovative technologies that enhance secure communications and data integrity across various platforms. Their offerings include SSH Tectia for secure file transfer and remote access, as well as solutions for managing encryption keys and compliance. With a focus on enterprise security, SSH Communications Security helps organizations safeguard critical information in both on-premises and cloud environments. For more information, visit their website at https://www.ssh.com.


Abhishek S.
AS
Overview Provided by:

Recent SSH PrivX Reviews

LV
Luis V.Small-Business (50 or fewer emp.)
4.0 out of 5
"Zero trust PAM"
PrivX is simple to deploy and does not need agents on each asset that you want to get access to. The integration with AD server is simple and suppo...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SSH PrivX Media

PrivX Case Study (Telecommunications)
Play SSH PrivX Video
PrivX Case Study (Telecommunications)
PrivX Case Study (Fortune500)
Play SSH PrivX Video
PrivX Case Study (Fortune500)

Official Downloads

Answer a few questions to help the SSH PrivX community
Have you used SSH PrivX before?
Yes

1 SSH PrivX Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 SSH PrivX Reviews
4.0 out of 5
1 SSH PrivX Reviews
4.0 out of 5

SSH PrivX Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
LV
Cyber Security Product Engineer
Computer & Network Security
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about SSH PrivX?

PrivX is simple to deploy and does not need agents on each asset that you want to get access to. The integration with AD server is simple and support LDAP, LDAPS, OpenLDAP and other protocols. The PrivX server is the basicc deployment to star monitoring the access to other servers and brings a video recording of each RDP and SSH session. Another point to consider is the context search on ssh session that allows to seek for commands executed during the session. The customer support and documentation are pretty good explained at the web site, also if you consider to integrate with other solutions like SIEM. The implementation takes 15min, only need to add the ssh repository and you are ready to start installing and the post intallation scripts helps to start working on privx.

The license mode is related of frecuency of use and number of users and server you want to monitor. Review collected by and hosted on G2.com.

What do you dislike about SSH PrivX?

The limitiation to monitor data bases is a big issue. They should add BDD monitoring like MySQL and Postgresql. The solution is good for ssh, rdp and https but they do not offer a report section to get sumamry reports, If you want to know that you have the main connectiong dashboard. Review collected by and hosted on G2.com.

What problems is SSH PrivX solving and how is that benefiting you?

Control how admin and root users get inside the critical assets. Control using role mapped credentials to get access to the main servers. Review collected by and hosted on G2.com.

There are not enough reviews of SSH PrivX for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,051)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(788)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
3
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(346)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
4
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(193)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
5
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
6
Teleport Logo
Teleport
4.5
(104)
The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure.
7
CyberArk Privileged Access Manager Logo
CyberArk Privileged Access Manager
4.4
(64)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
8
StrongDM Logo
StrongDM
4.7
(84)
strongDM’s People-First Access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability to simplify workflows and make it easier for technical staff to access the tools they need without compromising security and compliance requirements.
9
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
10
CloudEagle Logo
CloudEagle
4.7
(71)
CloudEagle is an all-in-one SaaS research, management and procurement platform
Show More