Home/Privileged Access Management (PAM) Software
Updated on: August 19, 2022

Privileged Access Management (PAM) Software

Privileged Access Management or PAM Software allows businesses to create, provision privileged access accounts, and secure the credentials in a centralized vault. Administrators create privileged access accounts that will enable admin accounts to access the required applications to perform their duties. Privileged accounts such as super admin accounts are linked to access critical company assets and prone to risks like hacking and misuse. PAM Software helps to set permissions, monitor, and log user actions, prevent concurrent access, and also set precise timeframes to access.

Showing 1 - 20 of 25 products
Sort By
PingAccess - Privileged Access Management (PAM) Software


Cloud Access and Identity management
(3 Ratings)

PingAccess pricing: PingAccess Offers Custom plan.

What is PingAccess and how does it work?

PingAccess is an advanced Access Security platform that ensures only those who are permitted have access to the resources they need by providing secure access to apps and APIs down to the URL level. It gives you the peace of mind that only authorized people have access to your important information. PingAccess offers a complete policy engine that guarantees that people seeking access have the device posture, user context, and proper rights to access apps down to the URL level. With PingAccess, policies can be added to APIs to prevent users in untrusted environments from performing particular HTTP operations, such as admins using delete outside the corporate network. It can be deployed through proxy, agents, or a mix of the two, and it interacts seamlessly with your web applications. To protect, extend and access on-premises to SSO web apps, you can use third-party cloud identity stores like Azure AD with PingAccess. Additionally, to support hybrid IT settings, you can install PingAccess in your local data center or in the cloud, and realize value quicker by employing Docker images and cloud containerization. show more

Foxpass - Privileged Access Management (PAM) Software


Get your network and servers managed in a simplified manner
(34 Ratings)

Foxpass pricing: Starts at $3.0.

What is Foxpass and how does it work?

Foxpass is a comprehensive Radius and LDAP system solution that helps companies bring the best practices to their infrastructure. The solution helps to enhance the organisation’s network and server security by allowing employees to get access to specific tools which are of utmost importance. Moreover, Foxpass also helps engineering teams to take advanced access control measures within minutes so that they can avoid costly security breaches and detrimental employee mistakes in no time. Its fully featured API is capable of controlling server access with high security in an automated manner, besides allowing users to change customer info, manage group memberships and much more. The cloud-hosted RADIUS and LDAP solution provided by Foxpass can be synced with Office365, Google and more to get full SSO on users’ WiFi, VPN and other devices. Moreover, companies also get to optimise real-time visibility into their preexisting infrastructure and automate threat detection and response time by logging the RADIUS and LDAP requests provided by Foxpass. Finally, it also ensures network wise safety and security by helping users apply dedicated passwords and self-service SSH keys. show more

Thycotic Privilege Manager - Privileged Access Management (PAM) Software

Thycotic Privilege Manager

Combat against current security threats and active vulnerabilities
(5 Ratings)

Thycotic Privilege Manager pricing: Thycotic Privilege Manager Offers Custom plan.

What is Thycotic Privilege Manager and how does it work?

Thycotic Privilege Manager as an application control and endpoint privilege management solution, helps enterprises combat modern security threats and active malware. A simple policy wizard and interactive console within the software helps users manage privileges in an efficient manner. It offers a host of reports inclusive of parameters like blocked malware, application usage and least privilege compliance. Thycotic Privilege Manager features robust integrations with external platforms like VirusTotal, Active Directory, ServiceNow, SysLog/SIEM and more. A learning module within the platform helps privilege managers discover multiple applications running on their endpoints, giving a precise snapshot of their usage, before managers can implement any changes. With the software, organizations can monitor local groups including their membership levels. A unified reporting dashboard, helps business houses review the status of activity logs, evaluate endpoints and event wise data as well. Other, features enlisted within Thycotic Privilege Manager include reverse proxy, sandboxing, local admin rights removal and more. show more

ARCON PAM - Privileged Access Management (PAM) Software


Protect your data and privacy using an advanced security system
(18 Ratings)

ARCON PAM pricing: ARCON PAM Offers Custom plan.

What is ARCON PAM and how does it work?

ARCON PAM is a privileged access management software that puts users’ data security and privacy protection on the top of its priority list. The software offers a host of fine-grained access control facilities for implementing a practice of privileged access on a ‘need-to-do basis’ and ‘need-to-know’ facility. An integrated feature like password vaulting, assures additional protection with an automatic and secured password changing process, besides randomizing privileged passwords in an instant. Users can use the software to mitigate risks and spot threats in real-time, securing their privileged access environment. With ARCON PAM, they can also allow one-time secure access to critical systems without sharing any privileged credentials. The platform offers appropriate assistance in reducing the surface of threats, by eliminating standing privileges to applications and systems. An in-built multi-factor authentication option empowers users to implement a powerful validation technology of their own, preventing unauthorized access. Furthermore, ACRON PAM offers access to audit trails, besides analytical tools and reports that help users improve their decision-making ability. show more

Centrify Zero Trust Privilege - Privileged Access Management (PAM) Software

Centrify Zero Trust Privilege

Boosts Privileged Access Management
(27 Ratings)

Centrify Zero Trust Privilege pricing: Centrify Zero Trust Privilege Offers Custom plan.

What is Centrify Zero Trust Privilege and how does it work?

Centrify Zero Trust Privilege respecifies the legacy of Privileged Access Management for modern-day enterprise IT infrastructure. It serves various industries including energy & utilities, banking, financial services, government, education and healthcare. Centrify Zero Trust Privilege minimises the attack surface, improves audit and compliance visibility as well as reduces risk, complexity and costs for modern or hybrid enterprises. It is designed to tackle requesters that are not only human but also machines, APIs and services. Furthermore, it integrates and interoperates with a much broader ecosystem including IaaS providers like Azure, AWS and with DevOps CI/CD pipelines tools like Ansible and HashiCorp. Centrify Zero Trust Privilege helps users to maintain a different population of identities across separate directories. It even establishes unique accounts for each administrator to use for the admin’s end-user identity, which is typically a publicly-known account with an email address. Furthermore, Centrify Zero Trust Privilege makes a sense of database administrator (DBA) and contextualises its requests. show more

AWS Secrets Manager - Privileged Access Management (PAM) Software

AWS Secrets Manager

Protect your company’s secrets with AWS Secrets Manager
(34 Ratings)

AWS Secrets Manager pricing: Starts at $0.4.

What is AWS Secrets Manager and how does it work?

AWS Secrets Manager is a comprehensive data protection solution that helps companies to safeguard the data required to get access to their applications, IT resources and other essential metrics. The service enables users to rotate, manage and retrieve their database credentials, API keys and other sensitive information in an efficient manner. Also, it uses encryption keys to encrypt data and store them in AWS Key Management Service (KMS). With AWS Secrets Manager, companies can rotate secrets on-demand or as per schedule by using an inbuilt Secrets Manager console, AWS CLI or AWS SDK. In addition, brands can even replicate essential information and store them in multiple regions in an automated way. Thus getting access to easy recovery after data loss. The solution also helps users with the monitoring and audit of their protected data through a variety of useful integrations made available to them. AWS Secrets Manager can also be used to manage information for workloads related to the Department of Defense. show more

Thycotic Secret Server - Privileged Access Management (PAM) Software

Thycotic Secret Server

Privileged access management solution
(72 Ratings)

Thycotic Secret Server pricing: Thycotic Secret Server Offers Custom plan.

What is Thycotic Secret Server and how does it work?

Thycotic Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. The software-as-a-service model lets you sign up and start right away. Total control over your end-to-end security systems and infrastructure. Discover Privileges Identify all service, application, administrator, and root accounts to curb sprawl and gain a full view of your privileged access. show more

BeyondTrust Password Safe - Privileged Access Management (PAM) Software

BeyondTrust Password Safe

Secure your accounts with BeyondTrust Password Safe
(18 Ratings)

BeyondTrust Password Safe pricing: BeyondTrust Password Safe Offers Custom plan.

What is BeyondTrust Password Safe and how does it work?

BeyondTrust Password Safe is a risk management software built to reduce risks by filtering access to private and sensitive information, and account passwords. It enables the discovery, management, audit, and monitoring of all types of privileged accounts and SSH Keys. With Beyond Trust Password Safe, you can onboard accounts automatically and eliminate embedded credentials in code and script. You can simplify access requests, measure user behaviors and asset characteristics and set alerts to suspicious deviations. It enables secure logging and monitoring of sensitive credential activity and auditing by leveraging extensive analytics. You can additionally generate reports on benchmarks, suspicious behavior and compliance. Users get the option to automate onboarding and discovery to scan, identify and profile applications. Users can control files, codes, and scripts and embed keys to secure back doors of their system. They can additionally secure the use of SSH keys to improve security over Linux and UNIX systems. The platforms offer a free demo version to their users and you can request the pricing of their pro versions to access the premium features on their official website. show more

ManageEngine Password Manager Pro - Privileged Access Management (PAM) Software

ManageEngine Password Manager Pro

Eliminate password fatigue and Improve IT productivity in real-time
(58 Ratings)

ManageEngine Password Manager Pro pricing: Starts at $595.0.

What is ManageEngine Password Manager Pro and how does it work?

ManageEngine Password Manager Pro is a password management solution for enterprises that provides them with a safe vault for managing and storing sensitive information that is shared. Other than passwords, it also keeps digital identities and documents of enterprises completely safe. Users can store all their enterprise passwords of shared accounts, privileged accounts, firecall accounts and others within a centralized and secured repository. It provides well-defined ownership for the passwords stored in the centralized vault, enabling users to share passwords with their colleagues as per requirements. Companies can import users/user groups from Windows Active Directory or LDAP and also access the authentication mechanism. The software allows users to personalise the passwords of remote sources as per convenience or automatically via scheduled tasks. It also ensures that enterprises are using passwords strong enough and applying periodic resets by generating and enforcing their password policy. ManageEngine Password Manager Pro automatically identifies and resets the passwords of service accounts associated with domain accounts. show more

CyberArk PAS - Privileged Access Management (PAM) Software

CyberArk PAS

Access Management and Security Software
(42 Ratings)

What is CyberArk PAS and how does it work?

CyberArk’s Privileged Access Security solution is a tool that reduces users' security risk and helps them meet their compliance requirements in a hassle-free manner. This can be achieved without introducing additional operational complexity. Users can leverage a flexible architecture that can scale to the most demanding enterprise deployments and integrate seamlessly with their existing security, operations, and DevOps tools. Users can also enforce role-based access controls and ensure their users have to 'check out' credentials, generate detailed and full reporting and demonstrate compliance with an audit trail. It lets users discover and manage privileged credentials and accounts. They can also record and monitor privileged sessions and remediate risky activities, whether on-premises, cloud, and hybrid environments. Users can enable the least privilege on both NIX and Windows servers and detect and mitigate domain controllers' threats. Users can control, manage, and audit non-human privileged access for applications, including commercial off-the-shelf and applications developed using DevOps tools. show more

BeyondTrust Endpoint Privilege Management - Privileged Access Management (PAM) Software
(31 Ratings)

BeyondTrust Endpoint Privilege Management pricing: BeyondTrust Endpoint Privilege Management Offers Custom plan.

What is BeyondTrust Endpoint Privilege Management and how does it work?

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux, and networked devices. Analyze user behavior by collecting, securely storing, and indexing keystroke logs, session recordings, and other privileged events. Enable users to run specific commands and conduct sessions remotely based on rules without logging on as admin or root. BeyondTrust AD Bridge is the only solution that does not have to modify your Active Directory schema to add Unix and Linux systems to your network. show more

BeyondTrust PRA - Privileged Access Management (PAM) Software

BeyondTrust PRA

Deploy a powerful, privileged remote access system for enhanced security
(37 Ratings)

BeyondTrust PRA pricing: BeyondTrust PRA Offers Custom plan.

What is BeyondTrust PRA and how does it work?

BeyondTrust PRA is an affluent remote access management software that empowers users to manage, secure, and audit internal and vendor remote privileged access with no VPN. Users can easily eliminate cybersecurity threat factors with this software. They also get to meet external and internal privileged access compliance requirements, with comprehensive session forensics and audit trails. Additionally, the platform comes equipped with prevention metrics like “privilege creep”, offering active protection of users' IT assets by enforcing the least privileges. Besides helping in vendor onboarding, BeyondTrust PRA helps to strengthen the IaaS accounts’ security by leveraging the existing security systems. Seamless integration with external password management solutions or BeyondTrust Password Safe helps users with their work in a seamless manner. The software lets users enhance the security of IaaS accounts by increasing the accountability related to root accounts besides enabling them to work across hybrid environments. show more

Omada CIAM - Privileged Access Management (PAM) Software

Omada CIAM

Seamless access to digitized services
(2 Ratings)

Omada CIAM pricing: Omada CIAM Offers Custom plan.

What is Omada CIAM and how does it work?

Omada identity cloud is a leading SaaS identity governance and administration solution on the market providing comprehensive IGA capabilities.With Omada you get full-featured IGA. You get granular, automated, and intelligent controls for the enforcement of rules and policies. Provides modern access automation, reconciliation, and reporting capabilities to ensure that you have full oversight of access rights at all times.Omada can configure without code, IT systems, or cloud application uses the template-based approach. Provides the best framework for solution design and deployment and reduces customer risk. Some included services are a scalable cloud environment that is included for integration, staging, and production; continuous performance monitoring and enhancement- flexible upgrade windows that fit your business needs; high-availability services and continuity management and also has disaster recovery and backup.Comprehensive and responsive support is guaranteed within a maximum of 1 hour. You get access to the Omada service desk, online community, and knowledge-sharing HUB.The platform has a dedicated customer success team and standardized packages for improved time-to-value. show more

Symantec PAM - Privileged Access Management (PAM) Software

Symantec PAM

Protect your privileged accounts with Symantec PAM
(20 Ratings)

Symantec PAM pricing: Symantec PAM Offers Custom plan.

What is Symantec PAM and how does it work?

Symantec PAM offers comprehensive access governance and management capabilities through a business-oriented and ready-to-use interface. The platform helps prevent security breaches by protecting sensitive administrative credentials, proactively enforcing security policies and controlling privileged user access, besides monitoring and recording the same across virtual, physical and cloud environments. The platform is the best in the market to manage and protect accounts and credentials with elevated privileges. Furthermore, Symantec PAM addresses the security challenges associated with migratory apps and data to the cloud. The platform also helps extend privileged access management to the company’s dev environments, associating secrets management. Companies can also verify every user and device, requesting access with unlimited entitlements of Symantec PAM. By valuing and rotating passwords, the platform has maintained PCI compliance. Symantec PAM further offers professional services where users organisations can streamline deployment, upgrade software as well manage security posture. Furthermore, it offers a full range of training solutions to advance technical skills, maximising one’s investment. show more

BeyondTrust Privileged Identity - Privileged Access Management (PAM) Software

BeyondTrust Privileged Identity

Reduce Cyber Breach Risk by Simplifying Privileged Identity Management of Credentials
(6 Ratings)

BeyondTrust Privileged Identity pricing: BeyondTrust Privileged Identity Offers Custom plan.

What is BeyondTrust Privileged Identity and how does it work?

BeyondTrust is the industry leader in Privileged Access Management, providing the most comprehensive solution for preventing data breaches caused by stolen credentials, misused rights, and hacked remote access. As threats evolve across endpoint, server, cloud, DevOps, and network device settings, our flexible technology enables enterprises to effectively scale privilege security. BeyondTrust combines the industry's most comprehensive set of privileged access capabilities with centralized administration, reporting, and analytics, allowing leaders to take decisive and informed measures to combat attackers. Our comprehensive platform stands out for its adaptable architecture, which makes integrations easier, increases user productivity, and helps you get the most out of your IT and security investments. BeyondTrust provides the insight and control that enterprises need to reduce risk, meet compliance goals, and improve operational performance. 20,000 customers, including half of the Fortune 100, and a global partner network put their trust in us. BeyondTrust, Bomgar, Avecto, and Lieberman Software have teamed up to provide the most comprehensive solution for preventing privilege-related breaches while empowering users. show more

NextLabs - Privileged Access Management (PAM) Software


Data centric security and dynamic authorization platform
Write Review

NextLabs pricing: NextLabs Offers Custom plan.

What is NextLabs and how does it work?

NextLabs is an advanced data centric security and dynamic authorization platform that ensures the protection of all of your business critical applications and data. It enables you to monitor and control data usage and activity, classify and identify sensitive information and data, apply digital rights, prevent risky activities and meet compliance. With NextLabs, you can use policy enforcement to manage and control access, allow secure access to proprietary and commercial applications, prevent unauthorized access of sensitive files, and share secure information with partners, mobile employees, and suppliers. It provides visibility, centralized policy management, and control for NextLab’s Rights Management and Entitlement Management. You can shield your data by enabling data filtering and protect your original and sensitive data via data masking with NextLabs. Users additionally get the feature of data loss prevention and data protection with NextLabs. It also provides audit reports and logs to ensure compliance additional to activity monitoring and tracking across various apps and servers. The platform offers a team of experts to assist and guide you whenever you are stuck using the platform or want to know about anything. show more

RevBits Privileged Access Management - Privileged Access Management (PAM) Software
Write Review

RevBits Privileged Access Management pricing: RevBits Privileged Access Management Offers Custom plan.

What is RevBits Privileged Access Management and how does it work?

RevBits Privileged Access Management software with privileged access, privileged session, password, service accounts, key and certificate management for native clients with a single click. The Password Module provides strong password suggestions and encryption model for maximum data security with DBA monitoring capability. It supports Windows, Linux, MacOS, and Android & iOS and browser support for Chrome, Firefox, Safari, Internet Explorer, Edge and Opera. It integrates with SIEM providers like Splunk and LogRhythm. show more

Remediant SecureONE - Privileged Access Management (PAM) Software

Remediant SecureONE

Advanced Privileged Access Management (PAM) solution
Write Review

Remediant SecureONE pricing: Remediant SecureONE Offers Custom plan.

What is Remediant SecureONE and how does it work?

SecureONE is a specialized Privileged Access Management (PAM) product by Remediant, developed especially to cater to the evolving cyber security requirements. It is a leader in cybersecurity innovation, enabling enterprise-class solutions for real-time monitoring, zero-trust privileged account protection, and Just-In-Time Administration (JITA) across IT/Security ecosystems. It eliminates standing privilege with continuous scanning and agentless, faultless simplicity, unlike conventional privileged access management (PAM) systems that leave an exposed attack surface and are difficult to install by giving Just-Enough access, Just-in-Time. By giving privileged access on a Just-in-Time, Just-enough basis and utilizing two-factor authentication, SecureONE guarantees that privileged access is accurately assigned and continually inventoried. It was created with the intent of addressing this issue with an identity-enabled response and serving as a force multiplier for security initiatives all around the world. It defends businesses against the exploitation of stolen credentials to steal their data, which is the most common attack vector in all the ecosystems. Remediate is primarily aimed at small to medium businesses, and its price is quite competitive. Clients may anticipate spending around $22–25 per device with Remediate. show more

CloudKnox - Privileged Access Management (PAM) Software


Implement your decisions with solidarity using CloudKnox
Write Review

CloudKnox pricing: CloudKnox Offers Custom plan.

What is CloudKnox and how does it work?

CloudKnox is an integrated multi-cloud, hybrid cloud permissions management platform that offers granular visibility, constant monitoring and automated remediation. The platform supports adaptive and continuous risk-based decision making, dependent on Gartner’s CARTA Framework. Further, it continuously adapts and updates the Identity Access Management (IAM) service at the same time. IAM, as defined by CloudKnox’s experts, is the intuitive process of assessing and managing the different and ever-changing roles and identity privileges across an organisation possessing user access. Moreover, CloudKnox’s Privilege Creep Index technology generates valuable insights into the company’s insider risk profile. A thorough analysis of identities, actions, access rights and resources offers a multi-dimensional view of the risk involved if any. Further, CloudKnox provides detailed information about access keys, people they are assigned to, time of use and the purpose of them being in use. Privilege rightsizing and privilege role creation can be further simplified with the click of a button. CloudKnox’s unique system continuously monitors identities, actions and resource changes. show more

Refine Results CLEAR ALL
Starting Price
Customer Types
Pricing Model
Integrated With

List of Privileged Access Management (PAM) Software


Articles on Privileged Access Management (PAM) Software

Top Software
Cybersecurity is one of the major concerns that businesses face, especially when it comes to... read more

Related Links

Popular Categories

Trending Categories

Featured Links

Popular Softwares

Featured Softwares

Trending Softwares