Home/Privileged Access Management (PAM) Software
Updated on: April 15, 2021

Privileged Access Management (PAM) Software

Privileged Access Management or PAM Software allows businesses to create, provision privileged access accounts, and secure the credentials in a centralized vault. Administrators create privileged access accounts that will enable admin accounts to access the required applications to perform their duties. Privileged accounts such as super admin accounts are linked to access critical company assets and prone to risks like hacking and misuse. PAM Software helps to set permissions, monitor, and log user actions, prevent concurrent access, and also set precise timeframes to access.

Showing 1 - 10 of 21 products
Sort By

Remediant SecureONE

Providing the right admin access at the right time
(1 Ratings)

Remediant leads with innovation, delivering enterprise-class cybersecurity solutions that enable real-time monitoring, zero trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security ecosystems. We protect organizations from stolen credentials being used to... read more

BeyondTrust Password Safe

Unified Password and Session Management
(6 Ratings)

Password Safe helps you reduce the risks associated with privileged credential compromise by safeguarding access to privileged account passwords and SSH Keys. Evaluate just-in-time context and simplify access requests by considering the day, date, time and location when a user accesses resources to... read more


Cloud Radius and Cloud LDAP Authentication Servers
(54 Ratings)

Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need. Log LDAP and RADIUS requests for greater security and visibility for the most sensitive areas of your infrastructure. Self-service SSH keys and password management for... read more

Thycotic Privilege Manager

Combat against current security threats and active vulnerabilities
(2 Ratings)

Thycotic Privilege Manager as an application control and endpoint privilege management solution, helps enterprises combat modern security threats and active malware. A simple policy wizard and interactive console within the software helps users manage privileges in an efficient manner. It offers a... read more


Protect your data and privacy using an advanced security system
(17 Ratings)

ARCON PAM is a privileged access management software that puts users’ data security and privacy protection on the top of its priority list. The software offers a host of fine-grained access control facilities for implementing a practice of privileged access on a ‘need-to-do basis’ and... read more

Thycotic Secret Server

Privileged access management solution
(53 Ratings)

Thycotic Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. The software-as-a-service model lets you sign up and start right away. Total control over your end-to-end security systems and... read more

AWS Secrets Manager

Easily rotate and manage secrets throughout their lifecycle
(15 Ratings)

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments. With Secrets Manager, you can... read more

CyberArk PAS

Access Management and Security Software
(30 Ratings)

CyberArk’s Privileged Access Security solution is a tool that reduces users' security risk and helps them meet their compliance requirements in a hassle-free manner. This can be achieved without introducing additional operational complexity. Users can leverage a flexible architecture that can... read more

Centrify Zero Trust Privilege

Privileged Access Management
(27 Ratings)

Centrify Zero Trust Privilege redefines legacy Privileged Access Management (PAM) for the modern enterprise IT threatscape. A Zero Trust Privilege approach helps enterprises grant the least privilege access based on verifying who is requesting access, the context of the request, and the risk of the... read more

Refine Results CLEAR ALL
Customer Types
Pricing Model
Integrated With

List of Privileged Access Management (PAM) Software


Ask the Community View Community

Related Links

Popular Categories

Trending Categories

Featured Categories

Popular Softwares

Featured Softwares

Trending Softwares