Home/Privileged Access Management (PAM) Software/Teleport/Teleport AlternativesUpdated on: December 10, 2022
Teleport Provides privileged access management for elastic infrastructure

Teleport Alternatives and Competitors

(34 Alternatives found)
Showing 1 - 20 of 34 products
Sort By

Top 5 Teleport Alternatives

Tailscale - VPN Software
88%The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More


Secured network services delivered efficiently
(1 Ratings)

Tailscale pricing: Starts at $5.0. Offers Free-forever and Custom plan.

What is Tailscale and how does it work?

Tailscale is a reliable VPN service for secure networks making all devices and applications easily accessible from anywhere in the world. This platform delivers a host of features secured with zero configuration, besides being compatible with a variety of operating systems. Tailscale provides its users with a stable IP and auto-assigned domain facilitating consistency, irrespective of the connection, the device is compatible with. This ensures complete anonymity and restricts geographical tracking as well. Users can further define role-based access controls to restrict access to sensitive servers and specifically authorise contractors to only see what they need. Tailscale also delivers a comprehensive dashboard and logging API that displays multiple VPN functions, facilitating seamless operations. Beyond this, the platform uses high-quality and sophisticated security facilities to encrypt data effectively. With automatic key rotations taking place hourly and daily, the platform eliminates all potential chances of keys from being stolen. Moreover, other essential security best practices help users stay completely anonymous throughout their login period. show more

Teleport vs Tailscale | Tailscale Alternatives
Goose VPN - VPN Software
90%The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Goose VPN

Cloud-based VPN tool with multi deployment options
(4,288 Ratings)

What is Goose VPN and how does it work?

Goose VPN is also available in its free version and can be successfully run on multiple platforms like Web, Mac, Windows, Android native & iOS native. This online VPN software helps users to do net surfing and sign in on various websites without the risk of being logged ever. A significant pros of using this software is that it never slows down the internet connection at anytime as it never does not use bandwidth throttling. With a Goose VPN connection, users can browse the internet carefree as their online activities cannot be tracked by anyone. This VPN tool comes with features like DNS leak protection, kill switch and peer-to-peer facilities. It supports multi-language & multi-protocol. show more

Teleport vs Goose VPN | Goose VPN Alternatives
strongDM - New SaaS Software


The safest network connection in an organization
(2 Ratings)

strongDM pricing: Starts at $50.0.

What is strongDM and how does it work?

strongDM is a futuristic networking tool that helps companies to manage and audit employees’ access to their database, clusters, servers and web apps in an organised manner. A network at strongDM comprises a local client, gateway and configuration layer. The local client tunnels send requests to the gateway from users’ workstations, via a single TLS 1.2 secure TCP connection. Further, to check the authentication of users who have logged into the local client, their requests are optionally redirected to SSO or their identity providers. In strongDM, the local client includes both command-line as well as graphical interfaces. The gateway feature within the same serves as the entry point of the network, which can be deployed using DNS entry. Gateways are capable of decrypting the security credentials from the end-users side and deconstruct requests for auditing purposes. Configuration layer is the place where Admin UI is present. Users can be assigned roles based on a collection of permissions across servers, clusters, databases and web apps. At last, the configuration is sent to the local client and gets updated in real-time. show more

Teleport vs strongDM | strongDM Alternatives
Candidate Code - New SaaS Software

Candidate Code

Keep code in its proper place
(0 Ratings)

Candidate Code pricing: Starts at $27.0. Offers Free-forever and Custom plan.

What is Candidate Code and how does it work?

Candidate Code makes taking coding tests at home simple. Setup a git repository with one click and assign it to applicants. As a group, review, comment, and rate submissions together. Allow candidates to utilise the tools they are most familiar with. Keep code in Git, where it belongs. There will be no more email attachments of repository zip archives; there will be no more confusion about which version was sent, and there will be no miscommunication about where the results have gone. Each candidate's whole git history is instantly accessible.You may verify that a candidate has the abilities you need for the job by creating challenges that are exclusive to your company. For large-scale technical recruiting, code-based assessments provide a reliable and efficient screening stage. Make the most effective use of your engineering and HR resources. A technical recruiting test allows candidates to demonstrate competency in as close to ideal conditions as possible, at their own pace, using their own equipment and software. show more

Teleport vs Candidate Code | Candidate Code Alternatives
Okta - Identity and Access Management (IAM) Software
98%The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More


Seamless, secure, user-friendly, all that you can ask for
(983 Ratings)

Okta pricing: Starts at $2.0.

What is Okta and how does it work?

Okta is an identity and access management software that provides great user experience and easy administration by connecting suppliers, partners and customers of an enterprise securely within a single loop. It is an identity provider having deep integrations to hundreds of apps, which can be accessed through multiple devices very safely and securely. Octa helps companies to modernize IT by enabling them to move faster automatically and even eliminate friction, build customer experiences by delighting them with personalised and inherently secure applications and even prevent data breaches by establishing people as the new security perimeter. In simple words, Okta sets an identity standard which is independent and neutral. It is a platform which securely connects the right people to the right technologies at the right time. It provides instant access to all apps with a single sign on, provides an added level of authentication which prevents identity attacks, encourages lifecycle management, centrally manages a universal directory in your organisation and even controls and manages API access securely. show more

Teleport vs Okta | Okta Alternatives

Products Similar to Teleport

CyberArk PAS - Privileged Access Management (PAM) Software

CyberArk PAS

Access Management and Security Software
(42 Ratings)

What is CyberArk PAS and how does it work?

CyberArk’s Privileged Access Security solution is a tool that reduces users' security risk and helps them meet their compliance requirements in a hassle-free manner. This can be achieved without introducing additional operational complexity. Users can leverage a flexible architecture that can scale to the most demanding enterprise deployments and integrate seamlessly with their existing security, operations, and DevOps tools. Users can also enforce role-based access controls and ensure their users have to 'check out' credentials, generate detailed and full reporting and demonstrate compliance with an audit trail. It lets users discover and manage privileged credentials and accounts. They can also record and monitor privileged sessions and remediate risky activities, whether on-premises, cloud, and hybrid environments. Users can enable the least privilege on both NIX and Windows servers and detect and mitigate domain controllers' threats. Users can control, manage, and audit non-human privileged access for applications, including commercial off-the-shelf and applications developed using DevOps tools. show more

Teleport vs CyberArk PAS | CyberArk PAS Alternatives
Smallstep SSH - New SaaS Software

Smallstep SSH

An SSH more convenient than this? No chance
(0 Ratings)

Smallstep SSH pricing: Starts at $3.0. Offers Free-forever and Custom plan.

What is Smallstep SSH and how does it work?

Smallstep SSH is a single sign-on SSH solution with zero key management. It removes the need for gathering, shipping and rotating public keys for all users and hosts alike. With Smallstep SSH, using SSH certificates becomes extremely convenient. The process is a detailed one and starts with the users signing in through OAuth and getting a personalised SSH for the day. These are then stored in the relevant memory storage. The identity provider user groups are automatically synchronised and are thereafter used for SSH access control and reporting compliance. Further, privacy is quite a sensitive issue and is addressed very skillfully at Small step SSH. Revoking one or multiple user identities automatically cuts down on their SSH access. The SSH user lifecycle management removes the need of adding or removing POSIX users for audit and synchronising public key files that are static across the fleet of hosts. Compliance includes reporting and logging of user sessions, access to multiple hosts, and priority escalations for simplifying related audits. The SSH logins are all seamlessly integrated. show more

Teleport vs Smallstep SSH | Smallstep SSH Alternatives
AWS Secrets Manager - Privileged Access Management (PAM) Software

AWS Secrets Manager

Protect your company’s secrets with AWS Secrets Manager
(34 Ratings)

AWS Secrets Manager pricing: Starts at $0.4.

What is AWS Secrets Manager and how does it work?

AWS Secrets Manager is a comprehensive data protection solution that helps companies to safeguard the data required to get access to their applications, IT resources and other essential metrics. The service enables users to rotate, manage and retrieve their database credentials, API keys and other sensitive information in an efficient manner. Also, it uses encryption keys to encrypt data and store them in AWS Key Management Service (KMS). With AWS Secrets Manager, companies can rotate secrets on-demand or as per schedule by using an inbuilt Secrets Manager console, AWS CLI or AWS SDK. In addition, brands can even replicate essential information and store them in multiple regions in an automated way. Thus getting access to easy recovery after data loss. The solution also helps users with the monitoring and audit of their protected data through a variety of useful integrations made available to them. AWS Secrets Manager can also be used to manage information for workloads related to the Department of Defense. show more

AWS Secrets Manager Alternatives
BeyondTrust Privileged Identity - Privileged Access Management (PAM) Software

BeyondTrust Privileged Identity

Reduce Cyber Breach Risk by Simplifying Privileged Identity Management of Credentials
(6 Ratings)

BeyondTrust Privileged Identity pricing: BeyondTrust Privileged Identity Offers Custom plan.

What is BeyondTrust Privileged Identity and how does it work?

BeyondTrust is the industry leader in Privileged Access Management, providing the most comprehensive solution for preventing data breaches caused by stolen credentials, misused rights, and hacked remote access. As threats evolve across endpoint, server, cloud, DevOps, and network device settings, our flexible technology enables enterprises to effectively scale privilege security. BeyondTrust combines the industry's most comprehensive set of privileged access capabilities with centralized administration, reporting, and analytics, allowing leaders to take decisive and informed measures to combat attackers. Our comprehensive platform stands out for its adaptable architecture, which makes integrations easier, increases user productivity, and helps you get the most out of your IT and security investments. BeyondTrust provides the insight and control that enterprises need to reduce risk, meet compliance goals, and improve operational performance. 20,000 customers, including half of the Fortune 100, and a global partner network put their trust in us. BeyondTrust, Bomgar, Avecto, and Lieberman Software have teamed up to provide the most comprehensive solution for preventing privilege-related breaches while empowering users. show more

BeyondTrust Privileged Identity Alternatives
BeyondTrust PRA - Privileged Access Management (PAM) Software

BeyondTrust PRA

Deploy a powerful, privileged remote access system for enhanced security
(37 Ratings)

BeyondTrust PRA pricing: BeyondTrust PRA Offers Custom plan.

What is BeyondTrust PRA and how does it work?

BeyondTrust PRA is an affluent remote access management software that empowers users to manage, secure, and audit internal and vendor remote privileged access with no VPN. Users can easily eliminate cybersecurity threat factors with this software. They also get to meet external and internal privileged access compliance requirements, with comprehensive session forensics and audit trails. Additionally, the platform comes equipped with prevention metrics like “privilege creep”, offering active protection of users' IT assets by enforcing the least privileges. Besides helping in vendor onboarding, BeyondTrust PRA helps to strengthen the IaaS accounts’ security by leveraging the existing security systems. Seamless integration with external password management solutions or BeyondTrust Password Safe helps users with their work in a seamless manner. The software lets users enhance the security of IaaS accounts by increasing the accountability related to root accounts besides enabling them to work across hybrid environments. show more

BeyondTrust PRA Alternatives
BeyondTrust Endpoint Privilege Management - Privileged Access Management (PAM) Software
(31 Ratings)

BeyondTrust Endpoint Privilege Management pricing: BeyondTrust Endpoint Privilege Management Offers Custom plan.

What is BeyondTrust Endpoint Privilege Management and how does it work?

BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux, and networked devices. Analyze user behavior by collecting, securely storing, and indexing keystroke logs, session recordings, and other privileged events. Enable users to run specific commands and conduct sessions remotely based on rules without logging on as admin or root. BeyondTrust AD Bridge is the only solution that does not have to modify your Active Directory schema to add Unix and Linux systems to your network. show more

BeyondTrust Endpoint Privilege Management Alternatives
BeyondTrust Password Safe - Privileged Access Management (PAM) Software

BeyondTrust Password Safe

Secure your accounts with BeyondTrust Password Safe
(18 Ratings)

BeyondTrust Password Safe pricing: BeyondTrust Password Safe Offers Custom plan.

What is BeyondTrust Password Safe and how does it work?

BeyondTrust Password Safe is a risk management software built to reduce risks by filtering access to private and sensitive information, and account passwords. It enables the discovery, management, audit, and monitoring of all types of privileged accounts and SSH Keys. With Beyond Trust Password Safe, you can onboard accounts automatically and eliminate embedded credentials in code and script. You can simplify access requests, measure user behaviors and asset characteristics and set alerts to suspicious deviations. It enables secure logging and monitoring of sensitive credential activity and auditing by leveraging extensive analytics. You can additionally generate reports on benchmarks, suspicious behavior and compliance. Users get the option to automate onboarding and discovery to scan, identify and profile applications. Users can control files, codes, and scripts and embed keys to secure back doors of their system. They can additionally secure the use of SSH keys to improve security over Linux and UNIX systems. The platforms offer a free demo version to their users and you can request the pricing of their pro versions to access the premium features on their official website. show more

BeyondTrust Password Safe Alternatives
Remediant SecureONE - Privileged Access Management (PAM) Software

Remediant SecureONE

Advanced Privileged Access Management (PAM) solution
(0 Ratings)

Remediant SecureONE pricing: Remediant SecureONE Offers Custom plan.

What is Remediant SecureONE and how does it work?

SecureONE is a specialized Privileged Access Management (PAM) product by Remediant, developed especially to cater to the evolving cyber security requirements. It is a leader in cybersecurity innovation, enabling enterprise-class solutions for real-time monitoring, zero-trust privileged account protection, and Just-In-Time Administration (JITA) across IT/Security ecosystems. It eliminates standing privilege with continuous scanning and agentless, faultless simplicity, unlike conventional privileged access management (PAM) systems that leave an exposed attack surface and are difficult to install by giving Just-Enough access, Just-in-Time. By giving privileged access on a Just-in-Time, Just-enough basis and utilizing two-factor authentication, SecureONE guarantees that privileged access is accurately assigned and continually inventoried. It was created with the intent of addressing this issue with an identity-enabled response and serving as a force multiplier for security initiatives all around the world. It defends businesses against the exploitation of stolen credentials to steal their data, which is the most common attack vector in all the ecosystems. Remediate is primarily aimed at small to medium businesses, and its price is quite competitive. Clients may anticipate spending around $22–25 per device with Remediate. show more

Remediant SecureONE Alternatives
Thycotic Privilege Manager - Privileged Access Management (PAM) Software

Thycotic Privilege Manager

Combat against current security threats and active vulnerabilities
(5 Ratings)

Thycotic Privilege Manager pricing: Thycotic Privilege Manager Offers Custom plan.

What is Thycotic Privilege Manager and how does it work?

Thycotic Privilege Manager as an application control and endpoint privilege management solution, helps enterprises combat modern security threats and active malware. A simple policy wizard and interactive console within the software helps users manage privileges in an efficient manner. It offers a host of reports inclusive of parameters like blocked malware, application usage and least privilege compliance. Thycotic Privilege Manager features robust integrations with external platforms like VirusTotal, Active Directory, ServiceNow, SysLog/SIEM and more. A learning module within the platform helps privilege managers discover multiple applications running on their endpoints, giving a precise snapshot of their usage, before managers can implement any changes. With the software, organizations can monitor local groups including their membership levels. A unified reporting dashboard, helps business houses review the status of activity logs, evaluate endpoints and event wise data as well. Other, features enlisted within Thycotic Privilege Manager include reverse proxy, sandboxing, local admin rights removal and more. show more

Thycotic Privilege Manager Alternatives
ManageEngine Password Manager Pro - Privileged Access Management (PAM) Software

ManageEngine Password Manager Pro

Eliminate password fatigue and Improve IT productivity in real-time
(58 Ratings)

ManageEngine Password Manager Pro pricing: Starts at $595.0.

What is ManageEngine Password Manager Pro and how does it work?

ManageEngine Password Manager Pro is a password management solution for enterprises that provides them with a safe vault for managing and storing sensitive information that is shared. Other than passwords, it also keeps digital identities and documents of enterprises completely safe. Users can store all their enterprise passwords of shared accounts, privileged accounts, firecall accounts and others within a centralized and secured repository. It provides well-defined ownership for the passwords stored in the centralized vault, enabling users to share passwords with their colleagues as per requirements. Companies can import users/user groups from Windows Active Directory or LDAP and also access the authentication mechanism. The software allows users to personalise the passwords of remote sources as per convenience or automatically via scheduled tasks. It also ensures that enterprises are using passwords strong enough and applying periodic resets by generating and enforcing their password policy. ManageEngine Password Manager Pro automatically identifies and resets the passwords of service accounts associated with domain accounts. show more

ManageEngine Password Manager Pro Alternatives
ManageEngine Access Manager Plus - Privileged Access Management (PAM) Software

ManageEngine Access Manager Plus

Secure remote access for privileged sessions
(0 Ratings)

ManageEngine Access Manager Plus pricing: Starts at $495.0.

What is ManageEngine Access Manager Plus and how does it work?

ManageEngine Access Manager Plus is a web-based privileged session management software for regulating access to remote systems through secure channels from a unified console. With comprehensive auditing capabilities, it offers total visibility into all privileged access use and lets enterprises manage privileged user sessions in real-time, shutting the door on privilege misuse. Remote work facilities for the entire workforce by enabling privileged access to sensitive corporate systems through secure RDP and SSH sessions. show more

ManageEngine Access Manager Plus Alternatives
ManageEngine PAM360 - Privileged Access Management (PAM) Software

ManageEngine PAM360

Minimize security vulnerabilities with impressive 360-degree protection
(0 Ratings)

ManageEngine PAM360 pricing: Starts at $7995.0.

What is ManageEngine PAM360 and how does it work?

ManageEngine PAM360 is an intuitive privilege access management solution for enterprises. It can be used to devise a centralized console, interconnecting different parts of the IT teams, facilitating deeper correlation between network data and quicker remedies. The software helps in streamlining a wide variety of business tasks like, workflow automation, online reputation monitoring, regulatory compliance and in-depth correlation of events. Privilege behavior monitoring feature within the particular, allows users to leverage upon ML and AI-driven, anomaly detection capabilities to detect unusual privilege activities in real-time. ManageEngine PAM360, assures protection against credential-based attacks, by allowing users to integrate password security within their DevOps pipeline. Without compromising on engineering efficiency levels. Organizations can capture privilege monitoring sessions in the form of video files and use them as evidence for investigative audits. SSL certificate monitoring is an impressive feature embedded within ManageEngine PAM360, the software offers validated integration with authorities like GoDaddy, Digicert and Let’s Encrypt. show more

ManageEngine PAM360 Alternatives
PingAccess - Privileged Access Management (PAM) Software


Cloud Access and Identity management
(3 Ratings)

PingAccess pricing: PingAccess Offers Custom plan.

What is PingAccess and how does it work?

PingAccess is an advanced Access Security platform that ensures only those who are permitted have access to the resources they need by providing secure access to apps and APIs down to the URL level. It gives you the peace of mind that only authorized people have access to your important information. PingAccess offers a complete policy engine that guarantees that people seeking access have the device posture, user context, and proper rights to access apps down to the URL level. With PingAccess, policies can be added to APIs to prevent users in untrusted environments from performing particular HTTP operations, such as admins using delete outside the corporate network. It can be deployed through proxy, agents, or a mix of the two, and it interacts seamlessly with your web applications. To protect, extend and access on-premises to SSO web apps, you can use third-party cloud identity stores like Azure AD with PingAccess. Additionally, to support hybrid IT settings, you can install PingAccess in your local data center or in the cloud, and realize value quicker by employing Docker images and cloud containerization. show more

PingAccess Alternatives
Centrify Zero Trust Privilege - Privileged Access Management (PAM) Software

Centrify Zero Trust Privilege

Boosts Privileged Access Management
(27 Ratings)

Centrify Zero Trust Privilege pricing: Centrify Zero Trust Privilege Offers Custom plan.

What is Centrify Zero Trust Privilege and how does it work?

Centrify Zero Trust Privilege respecifies the legacy of Privileged Access Management for modern-day enterprise IT infrastructure. It serves various industries including energy & utilities, banking, financial services, government, education and healthcare. Centrify Zero Trust Privilege minimises the attack surface, improves audit and compliance visibility as well as reduces risk, complexity and costs for modern or hybrid enterprises. It is designed to tackle requesters that are not only human but also machines, APIs and services. Furthermore, it integrates and interoperates with a much broader ecosystem including IaaS providers like Azure, AWS and with DevOps CI/CD pipelines tools like Ansible and HashiCorp. Centrify Zero Trust Privilege helps users to maintain a different population of identities across separate directories. It even establishes unique accounts for each administrator to use for the admin’s end-user identity, which is typically a publicly-known account with an email address. Furthermore, Centrify Zero Trust Privilege makes a sense of database administrator (DBA) and contextualises its requests. show more

Centrify Zero Trust Privilege Alternatives
WoTT - Privileged Access Management (PAM) Software


Security audit of Linux systems for restricting unauthorized access
(0 Ratings)

WoTT pricing: Starts at $9.0. Offers Free-forever and Custom plan.

What is WoTT and how does it work?

WoTT is a development tool which is used by IT professionals. It helps them to scan documents automatically while managing firewalls. It is also useful to establish a mutual transport security layer between clients and servers. There are many other operations which can be done with the help of this software. After audit, the software sends documentation through Slack or GitHub. Encryption of data via public key ensures the rotation of private key or the decryption of those data, thereby ensuring end-to-end security. Besides GitHub and Slack integrations, the software is integrated with Cloud Agnostics, providing users with unlimited cloud computing capability and storage. It provides open-source coding, letting public access, modification and enhancement of codes. It lets the DevOps developers ensure security at the very beginning rather than at the audit level, which helps provide a comprehensive protection cover at a minimal cost. Perimeter security is a notable feature that provides encryption of data as networks are generally impenetrable. show more

WoTT Alternatives
Refine Results CLEAR ALL
Starting Price
Customer Types
Pricing Model
Integrated With

Related Links

Featured Links

Popular Softwares

Featured Softwares