Home/Privileged Access Management (PAM) Software
Updated on: January 19, 2021

Privileged Access Management (PAM) Software

Privileged Access Management or PAM Software allows businesses to create, provision privileged access accounts, and secure the credentials in a centralized vault. Administrators create privileged access accounts that will enable admin accounts to access the required applications to perform their duties. Privileged accounts such as super admin accounts are linked to access critical company assets and prone to risks like hacking and misuse. PAM Software helps to set permissions, monitor, and log user actions, prevent concurrent access, and also set precise timeframes to access.

Showing 1 - 10 of 13 products
Sort By


Cloud Radius and Cloud LDAP Authentication Servers
(54 Ratings)

Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need. Log LDAP and RADIUS requests for greater security and visibility for the most sensitive areas of your infrastructure. Self-service SSH keys and password management for... read more

Thycotic Privilege Manager

A Secure Tool to Prevent threats
(2 Ratings)

Thycotic Privilege Manager software is a platform used to manage critical vulnerabilities. Deploy a Single Agent to measure the application usage with admin rights, even on non-domain machines. Analyze applications in real-time to automate admin approval workflow. Generate reports with activity... read more


Privileged Access Management
(17 Ratings)

ARCON Privileged Access Management (PAM) offers enterprise IT security, risk, and compliance management teams with necessary safeguards to securely manage the lifecycle of privileged accounts. Implement privileged access practice on ‘need-to-know’ and ‘need-to-do basis’. Automate and secure... read more

Thycotic Secret Server

Privileged access management solution
(53 Ratings)

Thycotic Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. The software-as-a-service model lets you sign up and start right away. Total control over your end-to-end security systems and... read more

AWS Secrets Manager

Easily rotate and manage secrets throughout their lifecycle
(15 Ratings)

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments. With Secrets Manager, you can... read more

CyberArk PAS

Dedicated to Stopping Attacks Before They Stop Business
(30 Ratings)

The CyberArk Privileged Access Security Solution addresses a wide range of use cases to secure privileged credentials and secrets wherever they exist: on-premises, in the cloud, and anywhere in between. Reduce your privileged access security risk with the industry’s most comprehensive Privileged... read more

Centrify Zero Trust Privilege

Privileged Access Management
(27 Ratings)

Centrify Zero Trust Privilege redefines legacy Privileged Access Management (PAM) for the modern enterprise IT threatscape. A Zero Trust Privilege approach helps enterprises grant the least privilege access based on verifying who is requesting access, the context of the request, and the risk of the... read more

BeyondTrust PRA

Privileged Access and Secure Remote Access
(24 Ratings)

BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Simplify the access process by providing one tool that facilitates all unattended access for remote systems and endpoints.... read more

ManageEngine Password Manager Pro

Enterprise password management
(50 Ratings)

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. Fine-grained restrictions on managing resources and passwords stored in PMP. Restrictions are enforced based on predefined user roles.... read more

Refine Results CLEAR ALL
Customer Types
Pricing Model
Integrated With

List of Privileged Access Management (PAM) Software


Ask the Community View Community