Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Symantec PAM Features

What are the features of Symantec PAM?

Functionality

  • Single Sign-On
  • Hide passwords

Administration

  • Self-Service Access Requests

Top Rated Symantec PAM Alternatives

Filter for Features

Functionality

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Based on 10 Symantec PAM reviews. Provides a single access point for users to access multiple cloud products without multiple logins.
80%
(Based on 10 reviews)

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.

Not enough data

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors.

Not enough data

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Based on 10 Symantec PAM reviews. Offers the option to hide passwords when sharing with users, such as contract workers
87%
(Based on 10 reviews)

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Monitoring

Audit Logging

Provides audit logs for compliance reasons.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Administration

Policy, User, and Role Management

Creates access requirements and standards and establishes user, roles, and access rights.

Not enough data

Approval Workflows

Allows administrators to approve or reject access changes to using defined workflows.

Not enough data

Automated Provisioning

Automates provisioning and deprovisioning to reduce the amount of administrative manual work.

Not enough data

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

Manages identity information from on-premise and cloud applications.

Not enough data

Self-Service Access Requests

As reported in 10 Symantec PAM reviews. Automatically allows access if users meet policy requirements.
77%
(Based on 10 reviews)

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.

Not enough data

Reporting

Includes reporting functionality.

Not enough data