Top Rated Symantec PAM Alternatives

The best i liked was the control that i could have in creating and modifying my security protection policies. Review collected by and hosted on G2.com.
I usually found that the windows machines were a but slow while working on PAM Review collected by and hosted on G2.com.
Video Reviews
21 out of 22 Total Reviews for Symantec PAM
Overall Review Sentiment for Symantec PAM
Log in to view review sentiment.

It monitors and records privileged sessions, so I can quickly detect any suspicious activity.
I limit access to sensitive systems, which reduces the risks of unauthorized entry."
It offers me secure, simplified access . Review collected by and hosted on G2.com.
initial configuration offers a time-consuming setup process that ensures robust security, requiring dedicated IT resources for optimal implementation. Review collected by and hosted on G2.com.

Basically, ease of application deployment.ITs virtual environment is best for any large or sensitive environment. You can deploy this on platforms like virtual, cloud, and on-premises physical environments. Review collected by and hosted on G2.com.
Of course like each effective, expansive company, it can be difficult to urge bolster or somebody on the phone to troubleshoot. I think this can be why matching them with a proficient administrations company is incredible since you’ll get an astonishing item with way better bolster for when your framework goes down Review collected by and hosted on G2.com.

It's very beneficial not only with the protection of the keys but, it also protects access across all of your hybrid environments. Review collected by and hosted on G2.com.
Not so user freindly and require a pure technical person to handle the system. Review collected by and hosted on G2.com.
this product is good for endpoint security Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution,. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints.
Endpoint security delivered your way. With a single agent, protection across traditional and mobile devices, and on-prem, cloud or hybrid management. Review collected by and hosted on G2.com.
The stability was not the best. There were times when antivirus updates broke it. It wasn't necessarily self-updating - at least, not in terms of the virus signatures. It updated in terms of the executable files. Therefore, when Windows updates would come out, they often couldn't be installed, or the computer would hang due to the fact that the updates weren't compatible with the antivirus. Review collected by and hosted on G2.com.
Initially the ease of deploying the appliances. It has gotten more difficult due to our growing knowledge and desire for greater HA and redundancy. Rotating a password either manually or via scheduled job works as expected. Review collected by and hosted on G2.com.
It doesn't integrate with all of our products and there is no agent for the Mainframe to allow for A2A to initiate from the mainframe to the mainframe or other distributed systems. Review collected by and hosted on G2.com.
We were having pim and Pam products which we need to handle them separately. With Pam 4.0 release we have the ability manage the endpoints with Pam itself. Review collected by and hosted on G2.com.
Nothing as of now. If found anything in the future will let you know Review collected by and hosted on G2.com.
ITs virtual environment is best for any large or sensitive environment , best for virtual prevent the branches, controlling proactively enforcing security policies Review collected by and hosted on G2.com.
Windows has been slower to adopt PAM Review collected by and hosted on G2.com.

It reduces the risk and gives the protection against data breaches by controlling users access, sensitive admin credentials and monitoring users activities across network. You can deploy this on platforms like virtual, cloud and on premises physical environments. Review collected by and hosted on G2.com.
Console can be improved may be user friendly Review collected by and hosted on G2.com.