Privileged Access Management (PAM) Solutions Directory

Below is a directory of Privileged Access Management (PAM) vendors, tools and software solutions including a company overview, links to social media and contact information for the top 11 Privileged Access Management providers. If you would like a printed version of this page including complete solutions profiles and a list of the top features of successful PAM deployments, click here for a Free PDF.


Identity Solution

Hungarian security firm Balabit offers a variety of Privileged Acces Management solutions, ranging from point solutions for preventing identity theft and monitoring privileged sessions, to its all-inclusive Privileged Access Management suite.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“Balabit’s Privileged Session Management, Shell Control Box (SCB), controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers – integrating seamlessly into existing networks. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigations.”

Contact

Alíz street 2. H-1117
Budapest
Hungary
+ 1 315 688 1020
www.balabit.com

Social

@CAincCA on LinkedinCA on FacebookCA on YouTube

Identity Solution

BeyondTrust’s Least Privilege Management and Server Privilege Management solutions offer strong privileged session management and monitoring capabilities, along with app-to-app password management capabilities and broad support for PIV-based authentication.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“PowerBroker Endpoint Least Privilege enforces least privilege across endpoints enterprise-wide, while providing visibility and control over all privileged applications and accounts. Delivered as an integrated solution, PowerBroker allows users to be productive while reducing risk, simplifying privileged access management deployments, and reducing costs.”

Contact

5090 North 40th Street
Phoenix, AZ 85018
United States
+1 (480) 405-9131
www.beyondtrust.com

Social

@CAincCA on LinkedinCA on FacebookCA on YouTube

Identity and Access Management Solutions Review - CA Technologies
Identity Solution

CA Technologies has been a player in the IAM market for years, but only recently launched its PAM solution (Privileged Access Manager) following its acquisition of Xceedium and their XSuite PAM solution.

Download this Directory along with our Free Privileged Access Management Buyers Guide.

From the Company

“CA Privileged Access Manager delivers the comprehensive functionality needed to prevent breaches, demonstrate compliance and boost operational efficiency—providing protection across the broadest and deepest range of infrastructure, including the data center, software-defined virtual data centers and networks as well as public/private clouds.”

Contact

CA Technologies
One CA Plaza
Islandia, NY 11749
United States
+1 (800) 225-5224
www.ca.com

Social

@CAincCA on LinkedinCA on FacebookCA on YouTube

Identity and Access Management Solutions Review - Centrify
Identity Solution

Centrify offers PAM-as-a-service via its cloud-based Privileged Access Security solution. Centrify’s solution includes a SaaS password safe, as well as RBAC, MFA, SSO, and session monitoring and recording capabilities. Privileged Access Security boasts impressive integration capabilities, with support for thousands of SaaS and IaaS platforms, making it an attractive solution for companies working in a modern hybrid IT environment.

Download this Directory and get our Free Privileged Access Management Buyers Guide.

From the Company

“Privileged Access Security enables organizations to reduce the risk of security breaches by minimizing the attack surface. Centrify’s privileged identity management solutions help you consolidate identities, deliver cross-platform, least-privilege access and control shared accounts, while securing remote access and auditing all privileged sessions.”

Contact

Centrify Corporation
3300 Tannery Way
Santa Clara, CA 95054
United States
+1 (669) 444-5200
www.centrify.com

Social

@Centrify Centrify on LinkedinCentrify on FacebookCentrify on YouTube

Identity Solution

Core Security, formerly known as Courion, offers Core PAM, a PAM solution that offers strong auto-discovery capabilities, as well as encryption, and security of privileged credentials. Core PAM automates credential access and usage and also allows you to rotate credentials on demand or by schedule.

Download this Directory and get our Free Privileged Access Management Buyers Guide.

From the Company

“Core PAM offers continuous auto-discovery, encryption, and security of privileged credentials. Core PAM automates credential access and usage and also allows you to rotate credentials on demand or by schedule. With Core PAM, you get the control you need of your privileged accounts with an audit trail for all privileged activity. ”

Contact

1000 Holcomb Woods
Roswell, GA, 30076
United States
+1 (678) 304-4500
www.coresecurity.com

Social
@CourionCourion on LinkedInCourion on Facebook

Identity Solution

Israeli cybersecurity firm CyberArk has a large share of the PAM market, and for good reason. The company’s Privileged Account Security Solutions offers an enterprise-grade, policy-based solution that secures, manages and logs privileged accounts and activities, and uses behavioral analytics on privileged account usage to detect and flag anomalies.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution. ”

Contact

60 Wells Avenue
Newton, MA 02459
United States
+1 (888) 808-9005
www.cyberark.com

Social
@CourionCourion on LinkedInCourion on FacebookCourion on YouTube

Identity Solution

Liebman Software offers what it calls Automated Privileged Identity Management, which it says completely eliminates manual password changes, changing privileged identities as fast as 850,000 privileged passwords per minute. The solution offers 2FA support and help desk integration, as well as policy management via a web admin interface.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“Protect privileged identities at scale using continuous automated controls. Our solution continuously scans the network looking for new systems and devices and immediately brings them under management based on policies you pre-configure. It is optimized for speed, understands platforms and can crawl stacks for credential use.”

Contact

1875 Century Park East
Los Angeles, CA 90067
United States
+1 (800) 829-6263
www.liebsoft.com

Social
@CourionCourion on LinkedInCourion on FacebookCourion on YouTube

Identity Solution

ManageEngine’s Password Manager Pro solution is somewhat limited in its capabilities but offers ease-of-use with an extremely intuitive user interface. ManageEngine’s discovery engine is capable of discovering and enumerating Windows local and domain accounts, network devices, virtual devices, and Linux devices.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access, and improving IT productivity many times by automating frequent password changes required in critical systems.”

 

Contact

4141 Hacienda Drive
Pleasanton, CA 94588
United States
+1 (925) 924-9500
www.manageengine.com

Social
@CourionCourion on LinkedInCourion on Facebook

Identity Solution

One Identity’s Privileged Password Manager lets organizations automate and control the process of granting access to privileged accounts and passwords. Privileged Password Manager offers strong auto discovery features, as well as automated provisioning capabilities. One Identity’s products are offered in a modular and integrated approach, allowing customers to add new capabilities quickly by building on existing investments.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

“One Identity Privileged Access Management solutions enable you to secure, control and audit privileged accounts by providing appropriate access through automated, policy-based workflows. One Identity solutions cover the entire range of privileged access management needs – from monitoring to governance – with an end-to-end approach. Improve security and compliance with more efficient administration, tracking and auditing of privileged accounts and access. ”

Contact

5 Polaris Way
Aliso Viejo, CA 92656
United States
+1 (949) 754–8000
www.oneidentity.com

Social
@CourionCourion on LinkedInCourion on Facebook

Identity Solution

Available on-premise or in the cloud, Thycotic’s Secret Server PAM solution offers a strong set of capabilities ranging from endpoint discovery to password management. Thycotic’s solution offers 2FA support, integration with SIEM and CRM software, and even automated databases for disaster recovery.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

Privilege Manager for Windows & Mac offers a comprehensive yet flexible application control and least privilege strategy solution enabling Deny-First Whitelisting, Blacklisting, Graylisting, along with Least Privilege policy-driven enforcement.”

Contact

1101 17th Street NW
Washington DC 20036
United States
+1 (202) 802-9399
www.thycotic.com

Social
@CourionCourion on LinkedInCourion on FacebookCourion on YouTube

XTON Logo
Identity Solution

XT Access Manager (XTAM) is one of the first PAM (Privileged Account Management) platforms to combine a secure identity vault, session management with recording and automated password resets at an affordable price point. Customers also can take advantage of powerful features including delegated script execution, discovery of privileged accounts and extensive reporting for network computers and IoT devices.

Download this Directory and get our Free Privileged Access Management Buyer’s Guide.

From the Company

A lot has changed in the security world, but one thing remains the same: compromised or misused privileged accounts are responsible for too many data breaches. We need security solutions that are easy to install and cloud ready. XTAM allows organizations to move Privileged Access Management (PAM) to the top of their good security practices checklist and mark it done by making it easy to implement. Download a Free trial now.

Contact

1210 Northbrook Drive STE 410
Trevose, PA 19035
United States
+1 (484) 876-1255
www.xtontech.com

Social
@XTONXTON on LinkedInXTON on FacebookXTON on YouTube