Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (4)
  • (1)
  • (3)
Deployment
  • (14)
  • (7)
  • (31)
  • (6)
  • (6)
Customer Types
  • (2)
  • (31)
  • (31)
  • (26)
Pricing Model
  • (12)
  • (3)
  • (1)
  • (8)
  • (26)
Integrated With
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 21 - 31 of 31 Products
Omada CIAM logo
Seamless access to digitized services 4 Based on 2 Ratings
Visit Website + Add to Compare

What is Omada CIAM and how does it work?

Omada identity cloud is a leading SaaS identity governance and administration solution on the market providing comprehensive IGA capabilities.With Omada you get full-featured IGA. You get granular, automated, and intelligent controls for the enforcement of rules and policies. Provides modern access automation, reconciliation, and reporting capabilities to ensure that you have full oversight of access rights at all times.Omada can configure without code, IT systems, or cloud application uses the template-based approach. Provides the best framework for solution design and deployment and reduces customer risk. Some included services are a scalable cloud environment that is included for integration, staging, and production; continuous performance monitoring and enhancement- flexible upgrade windows that fit your business needs; high-availability services and continuity management and also has disaster recovery and backup.Comprehensive and responsive support is guaranteed within a maximum of 1 hour. You get access to the Omada service desk, online community, and knowledge-sharing HUB.The platform has a dedicated customer success team and standardized packages for improved time-to-value.

Read More

Omada CIAM Pricing

  • Free Trial Not Available
  • Omada CIAM Offers Custom plan.
ManageEngine Password Manager Pro logo
Eliminate password fatigue and Improve IT productivity in real-time 3.9 Based on 133 Ratings
Visit Website + Add to Compare

What is ManageEngine Password Manager Pro and how does it work?

ManageEngine Password Manager Pro is a password management solution for enterprises that provides them with a safe vault for managing and storing sensitive information that is shared. Other than passwords, it also keeps digital identities and documents of enterprises completely safe. Users can store all their enterprise passwords of shared accounts, privileged accounts, firecall accounts and others within a centralized and secured repository. It provides well-defined ownership for the passwords stored in the centralized vault, enabling users to share passwords with their colleagues as per requirements. Companies can import users/user groups from Windows Active Directory or LDAP and also access the authentication mechanism. The software allows users to personalise the passwords of remote sources as per convenience or automatically via scheduled tasks. It also ensures that enterprises are using passwords strong enough and applying periodic resets by generating and enforcing their password policy. ManageEngine Password Manager Pro automatically identifies and resets the passwords of service accounts associated with domain accounts.

Read More

ManageEngine Password Manager Pro Pricing

  • Free Trial Available
  • Starts at $595.00.
BeyondTrust Privileged Identity logo
Reduce Cyber Breach Risk by Simplifying Privileged Identity Management of Credentials 3.6 Based on 10 Ratings
Visit Website + Add to Compare

What is BeyondTrust Privileged Identity and how does it work?

BeyondTrust is the industry leader in Privileged Access Management, providing the most comprehensive solution for preventing data breaches caused by stolen credentials, misused rights, and hacked remote access. As threats evolve across endpoint, server, cloud, DevOps, and network device settings, our flexible technology enables enterprises to effectively scale privilege security. BeyondTrust combines the industry's most comprehensive set of privileged access capabilities with centralized administration, reporting, and analytics, allowing leaders to take decisive and informed measures to combat attackers. Our comprehensive platform stands out for its adaptable architecture, which makes integrations easier, increases user productivity, and helps you get the most out of your IT and security investments. BeyondTrust provides the insight and control that enterprises need to reduce risk, meet compliance goals, and improve operational performance. 20,000 customers, including half of the Fortune 100, and a global partner network put their trust in us. BeyondTrust, Bomgar, Avecto, and Lieberman Software have teamed up to provide the most comprehensive solution for preventing privilege-related breaches while empowering users.

Read More

BeyondTrust Privileged Identity Pricing

  • Free Trial Not Available
  • BeyondTrust Privileged Identity Offers Custom plan.
Adioma logo
Online professional-grade infographic maker 3.5 Based on 4 Ratings
Visit Website + Add to Compare

What is Adioma and how does it work?

Adioma online diagram maker finds extensive application in creating and designing infographics within shortest possible time period. This software features multiple infographic templates to add ease to the process of its creation. This SaaS product does not require any extra software installation and doing hardware maintenance. Users can easily import as well as export data and designs using this tool. Using this you can create organizational chart depicting visually the internal structure of an enterprise. It contains a few important content marketing features like it helps in doing brand monitoring and supports multi-channel publishing. Adioma has automatic infographic color option.

Read More

Adioma Pricing

  • Free Trial Available
  • Starts at $29.00.
NextLabs logo
Data centric security and dynamic authorization platform Write a Review
Visit Website + Add to Compare

What is NextLabs and how does it work?

NextLabs is an advanced data centric security and dynamic authorization platform that ensures the protection of all of your business critical applications and data. It enables you to monitor and control data usage and activity, classify and identify sensitive information and data, apply digital rights, prevent risky activities and meet compliance. With NextLabs, you can use policy enforcement to manage and control access, allow secure access to proprietary and commercial applications, prevent unauthorized access of sensitive files, and share secure information with partners, mobile employees, and suppliers. It provides visibility, centralized policy management, and control for NextLab’s Rights Management and Entitlement Management. You can shield your data by enabling data filtering and protect your original and sensitive data via data masking with NextLabs. Users additionally get the feature of data loss prevention and data protection with NextLabs. It also provides audit reports and logs to ensure compliance additional to activity monitoring and tracking across various apps and servers. The platform offers a team of experts to assist and guide you whenever you are stuck using the platform or want to know about anything.

Read More

NextLabs Pricing

  • Free Trial Not Available
  • NextLabs Offers Custom plan.
Britive logo
A cloud-native security solution for cloud-forward enterprises Write a Review
Visit Website + Add to Compare

What is Britive and how does it work?

Britive is a cloud-native security solution that empowers companies to manage privileged access to multi-cloud environments. The software enables users to temporarily grant access privileges and expire them Just in Time (JIT) so that they can effectively protect their cloud data. It also allows users to grant and revoke Just in Time secrets that significantly reduce their credential exposure. With Britive, companies can maintain Least Privilege Access (LPA) by regularly managing the overly-broad permissions and eliminating unused credentials and accounts. The software can be integrated with users’ SIEM, UEBA and data lake technologies to get centralised cross-cloud visibility into risky activities and privileges. It even enables users to quickly gain information about high-risk identities, activities and privileges with the help of a unified cross-cloud access model. In addition, the other advantage of Britive that companies get includes easier cloud migration, better compliance, faster app development and exceptional security.

Read More

Britive Pricing

  • Free Trial Not Available
  • Britive Offers Custom plan.
AccessOwl logo
A new Privileged Access Management software. Write a Review
Visit Website + Add to Compare

What is AccessOwl and how does it work?

AccessOwl uses Slack to streamline access clearance processes while automatically documenting who has access to which applications. Using a central web application, you may have access to reports in minutes. Tool requests are easier for you and your team with AccessOwl, and you can keep track of all your tools and accesses. You save time and money by using AccessOwl to automate all of your access management operations. It covers every stage of an employee's career. It guarantees that new staff have immediate access to all necessary tools. A user offboarding is as simple as clicking a button, and no access is ever lost. HR, IT, and line managers are all aligned, which eliminates the need for back-and-forth communication. You get a crystal-clear audit trail of who has been allowed access to which resource, when, and why, available at the touch of a button. You may make sure that just the most essential permissions are granted to everyone. You can also manage access requests by internal and external rules like GDPR, SOC2, and ISO27001.

Read More

AccessOwl Pricing

  • Free Trial Available
  • Starts at $2.40. Offers Free-forever plan.
ManageEngine PAM360 logo
Minimize security vulnerabilities with impressive 360-degree protection Write a Review
Visit Website + Add to Compare

What is ManageEngine PAM360 and how does it work?

ManageEngine PAM360 is an intuitive privilege access management solution for enterprises. It can be used to devise a centralized console, interconnecting different parts of the IT teams, facilitating deeper correlation between network data and quicker remedies. The software helps in streamlining a wide variety of business tasks like, workflow automation, online reputation monitoring, regulatory compliance and in-depth correlation of events. Privilege behavior monitoring feature within the particular, allows users to leverage upon ML and AI-driven, anomaly detection capabilities to detect unusual privilege activities in real-time. ManageEngine PAM360, assures protection against credential-based attacks, by allowing users to integrate password security within their DevOps pipeline. Without compromising on engineering efficiency levels. Organizations can capture privilege monitoring sessions in the form of video files and use them as evidence for investigative audits. SSL certificate monitoring is an impressive feature embedded within ManageEngine PAM360, the software offers validated integration with authorities like GoDaddy, Digicert and Let’s Encrypt.

Read More

ManageEngine PAM360 Pricing

  • Free Trial Not Available
  • Starts at $7995.00.
Core Access Insight logo
Intelligent analytics to address immediate threats Write a Review
Visit Website + Add to Compare

What is Core Access Insight and how does it work?

Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business.

Read More

Core Access Insight Pricing

  • Free Trial Not Available
  • Core Access Insight Offers Custom plan.
WoTT logo
Security audit of Linux systems for restricting unauthorized access Write a Review
Visit Website + Add to Compare

What is WoTT and how does it work?

WoTT is a development tool which is used by IT professionals. It helps them to scan documents automatically while managing firewalls. It is also useful to establish a mutual transport security layer between clients and servers. There are many other operations which can be done with the help of this software. After audit, the software sends documentation through Slack or GitHub. Encryption of data via public key ensures the rotation of private key or the decryption of those data, thereby ensuring end-to-end security. Besides GitHub and Slack integrations, the software is integrated with Cloud Agnostics, providing users with unlimited cloud computing capability and storage. It provides open-source coding, letting public access, modification and enhancement of codes. It lets the DevOps developers ensure security at the very beginning rather than at the audit level, which helps provide a comprehensive protection cover at a minimal cost. Perimeter security is a notable feature that provides encryption of data as networks are generally impenetrable.

Read More

WoTT Pricing

  • Free Trial Not Available
  • Starts at $9.00. Offers Free-forever and Custom plan.
Teleport logo
Provides privileged access management for elastic infrastructure Write a Review
Visit Website + Add to Compare

What is Teleport and how does it work?

Gravitational Teleport is a cloud-native infrastructure in order to provide privileged access management (PAM). This software is required to replace SSHD or be used along with SSHD for organizations that are required to conduct SSH audit along with session replay/recording and also organizations that have Kubernetes or SSH access behind firewall clusters without any open ports. It enables the user to manage trust among teammates, data centers and organizations effectively. There is no need to manage individuals’ keys as the software provides short-lived certs for authorization. In order to provide familiar and seamless logins, the software integrates with the existing identity management solutions. The software also works with open-source standards such as Kubernetes and OpenSSH to enable the user to choose between a web client or a simple command. Teleport supports could support cloud-native and can run on any operating system and infrastructure which is compatible with SSH 2.0, OpenSSH and other open standards. It also supports the traditional Kubernetes and SSH Workflows for cloud-native infrastructure.

Read More

Teleport Pricing

  • Free Trial Available
  • Teleport Offers Free-forever and Custom plan.

List of Privileged Access Management (PAM) Software

PRODUCT NAME AGGREGATED RATINGS
Omada CIAM Omada CIAM 4
ManageEngine Password Manager Pro ManageEngine Password Manager Pro 3.9
BeyondTrust Privileged Identity BeyondTrust Privileged Identity 3.6
Adioma Adioma 3.5
NextLabs NextLabs 0
Britive Britive 0
AccessOwl AccessOwl 0
ManageEngine PAM360 ManageEngine PAM360 0
Core Access Insight Core Access Insight 0
WoTT WoTT 0

Articles on Privileged Access Management (PAM) Software

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed