Privileged Access Management (PAM) Solutions Directory

Identity Solution
BeyondTrust’s Least Privilege Management and Server Privilege Management solutions offer strong privileged session management and monitoring capabilities, along with app-to-app password management capabilities and broad support for PIV-based authentication.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
PowerBroker Endpoint Least Privilege enforces least privilege across endpoints enterprise-wide, while providing visibility and control over all privileged applications and accounts. Delivered as an integrated solution, PowerBroker allows users to be productive while reducing risk, simplifying privileged access management deployments, and reducing costs.
Contact
11695 Johns Creek Pkwy
Johns Creek, GA
United States
+1 (770) 407-1800
www.beyondtrust.com

Identity Solution
Since acquiring CA Technologies in 2018, Broadcom has folded CA Technologies’ privileged access management into their portfolio of enterprise solutions. In fact, they renamed their CA Privileged Access Management to the Layer7 Privileged Access Management solution. This solution works through granular authorization of users to systems and accounts. Also, it constantly monitors privileged activity to assess for risk and trigger automated mitigations when high risk is detected. Other key features privileged account vaulting and rotation and key or token-based authentication. Layer7 Privileged Access Management controls privileged access across all IT resources, including in the cloud, and discovering all virtual and cloud-based resources.
Download this Directory along with our Free Privileged Access Management Buyers Guide.
More Detail
Before its acquisition, CA Technologies was named to the Gartner 2018 Privileged Access Management Magic Quadrant as a Leader. In 2019, they received attention as a Visionary in the Gartner Magic Quadrant for Access Management; since Broadcom incorporated CA Technologies’ portfolio into their own, they should have the capabilities to protect complex and demanding environments. Broadcom emphasizes their automated risk mitigation and scalability as well as their protection of hybrid enterprise IT environments. They continue to mature their PAM capabilities for enterprises.
Contact
1320 Ridder Park Dr
San Jose, California
United States
+1 (408) 433-8000
www.broadcom.com

Identity Solution
Centrify offers PAM-as-a-service via its cloud-based Privileged Access Security solution. Centrify’s solution includes a SaaS password safe, as well as RBAC, MFA, SSO, and session monitoring and recording capabilities. Privileged Access Security boasts impressive integration capabilities, with support for thousands of SaaS and IaaS platforms, making it an attractive solution for companies working in a modern hybrid IT environment.
Download this Directory and get our Free Privileged Access Management Buyers Guide.
More Detail
Privileged Access Security enables organizations to reduce the risk of security breaches by minimizing the attack surface. Centrify’s privileged identity management solutions help you consolidate identities, deliver cross-platform, least-privilege access and control shared accounts, while securing remote access and auditing all privileged sessions.
Contact
3300 Tannery Way
Santa Clara, CA
United States
+1 (669) 444-5200
www.centrify.com

Identity Solution
Israeli cybersecurity firm CyberArk has a large share of the PAM market, and for good reason. The company’s Privileged Account Security Solutions offers an enterprise-grade, policy-based solution that secures, manages and logs privileged accounts and activities, and uses behavioral analytics on privileged account usage to detect and flag anomalies.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution.
Contact
60 Wells Ave
Newton, MA
United States
+1 (888) 808-9005
www.cyberark.com

Identity Solution
Ekran System is an insider threat protection platform that provides proper security control over your enterprise’s privileged accounts. It offers lightweight software agents for all kinds of endpoints, supporting any access scheme and network architecture, including hybrid. Agents combine access management functionality with comprehensive activity monitoring, recording, and alerting and enable essential incident response capabilities.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
Ekran System is a flexible software platform supporting a wide range of operating systems, virtual and physical infrastructures, servers, and desktops. Offering a combination of clients with various configurations, Ekran System can fit your enterprise’s infrastructure and security requirements. All parts are managed via a single web-based control center, enabling easy maintenance and multi-tenant and high-availability deployments.
Contact
3500 South DuPont Hwy
Dover, DE
United States
+1 (952) 217-7041
www.ekransystem.com

Identity Solution
ManageEngine’s Password Manager Pro solution is somewhat limited in its capabilities but offers ease-of-use with an extremely intuitive user interface. ManageEngine’s discovery engine is capable of discovering and enumerating Windows local and domain accounts, network devices, virtual devices, and Linux devices.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access, and improving IT productivity many times by automating frequent password changes required in critical systems.
Contact
4141 Hacienda Dr
Pleasanton, CA
United States
+1 (925) 924-9500
www.manageengine.com

Identity Solution
One Identity’s Privileged Password Manager lets organizations automate and control the process of granting access to privileged accounts and passwords. Privileged Password Manager offers strong auto discovery features, as well as automated provisioning capabilities. One Identity’s products are offered in a modular and integrated approach, allowing customers to add new capabilities quickly by building on existing investments.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
One Identity Privileged Access Management solutions enable you to secure, control and audit privileged accounts by providing appropriate access through automated, policy-based workflows. One Identity solutions cover the entire range of privileged access management needs – from monitoring to governance – with an end-to-end approach. Improve security and compliance with more efficient administration, tracking and auditing of privileged accounts and access.
Contact
5 Polaris Way
Aliso Viejo, CA
United States
+1 (949) 754–8000
www.oneidentity.com

Identity Solution
Since merging with Core Security in 2018, SecureAuth has supplemented their multifactor authentication use cases with more identity governance and privileged access management capabilities. SecureAuth offers specific industry solutions for healthcare, energy, and retail.
Download this Directory and get our Free Privileged Access Management Buyers Guide.
More Detail
SecureAuth is widely utilized in highly-regulated industries and should be considered for enterprises operating in industries operating in fields such as healthcare, banking, and natural resources. They support privileged access to major cloud environments, and they also automate credential access and usage.
Contact
8845 Irvine Center Dr
Irvine, CA
United States
+1 (949) 777-6959
www.secureauth.com

Identity Solution
Available on-premise or in the cloud, Thycotic’s Secret Server PAM solution offers a strong set of capabilities ranging from endpoint discovery to password management. Thycotic’s solution offers 2FA support, integration with SIEM and CRM software, and even automated databases for disaster recovery.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
Privilege Manager for Windows & Mac offers a comprehensive yet flexible application control and least privilege strategy solution enabling Deny-First Whitelisting, Blacklisting, Graylisting, along with Least Privilege policy-driven enforcement.
Contact
1101 17th St NW
Washington, DC
United States
+1 (202) 802-9399
www.thycotic.com

Identity Solution
XT Access Manager (XTAM) is one of the first PAM (Privileged Account Management) platforms to combine a secure identity vault, session management with recording and automated password resets at an affordable price point. Customers also can take advantage of powerful features including delegated script execution, discovery of privileged accounts and extensive reporting for network computers and IoT devices.
Download this Directory and get our Free Privileged Access Management Buyer’s Guide.
More Detail
A lot has changed in the security world, but one thing remains the same: compromised or misused privileged accounts are responsible for too many data breaches. We need security solutions that are easy to install and cloud ready. XTAM allows organizations to move Privileged Access Management (PAM) to the top of their good security practices checklist and mark it done by making it easy to implement. Download a Free trial now.
Contact
1210 Northbrook Dr
Trevose, PA
United States
+1 (484) 876-1255
www.xtontech.com