Best Privileged Access Management Software

Privileged access management (PAM) software allows administrators to control an employee or business partner’s access to sensitive information and applications. This allows businesses to gain greater control over who is able to enter networks, utilize applications, and view sensitive data. These solutions provide an identity to each individual user with a set of permissions for account access. PAM tools often provide identity lifecycle management features to create, edit, and eliminate a user’s privileged access permissions. These tools improve data security and simplify identity management for businesses.

There is some crossover between PAM solutions and customer identity and access management (CIAM) tools. PAM offerings are more geared toward internal employee permissions and business-to-business relations. CIAM solutions, on the other hand, help companies create consumer identities and control customer access capabilities.

To qualify for inclusion in the Privileged Access Management category, a product must:

  • Allow administrators to create and provision privileged access accounts
  • Provide identity lifecycle management features
  • Monitor privileged access behaviors
  • Record historical privileged access

Privileged Access Management Software Grid® Overview

The best Privileged Access Management Software products are determined by customer satisfaction (based on user reviews) and market presence (based on products’ scale, focus, and influence) and placed into four categories on the Grid®:
G2 Crowd Grid® for Privileged Access Management
Leaders
High Performers
Contenders
Niche
Okta
Centrify application services
Cyberark
Onelogin
Rsa securid access
Microsoft azure active directory
Bitium
Salesforce platform identity
Aws identity and access management iam
Market Presence
Satisfaction
Linked in no background
Compare Privileged Access Management Software
    Results: 64

    Filters
    Star Rating

    Privileged Access Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.

    Get a Quote

    Ensure users have convenient, secure access—from any device, anywhere—to the applications they need, whether in the cloud or on-premises. RSA SecurID Access is an enterprise-grade multi-factor authentication and access management solution that lets organizations consistently and centrally enforce dynamic risk-driven access policies aimed at providing continuous, seamless authentication. It protects all of your resources with a wide range of authentication methods, including push notification, biometrics, OTP, SMS, and traditional hardware and software tokens.


    Salesforce App Cloud provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.

    Get a Quote

    Centrify Application Services improves end-user productivity and secures every user’s access to apps. IT teams that leverage Centrify's Application Services are able to support internal users (employees, contractors) and external users (partners, customers), wherever they are. Components of Centrify Application Services: Single Sign-On – One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Adaptive MFA for App Access – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Workflow & Lifecycle Management – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management – Manage devices, secure native mobile apps and provide context for smarter access decisions. App Gateway – Provide your IT administration teams with secure, granular access to infrastructure regardless of location and without the hassles of a VPN. More about Centrify: Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, validates their devices, and limits access and privilege.   Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). 
 Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by top tier investors including Accel Partners, Mayfield, Sigma West, Index Ventures, Samsung Ventures, NTT Docomo and Fortinet.

    Get a Quote

    Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.


    AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

    Get a Quote

    Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.


    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.


    Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others. With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.


    Active Directory Management and Reporting Solution


    Access Manager provides a simple yet secure and scalable solution that can handle all your web access needs—both internal as well as in the cloud.

    Get a Quote

    Centrify’s Infrastructure Services are designed to stop breaches that abuse privilege. IT teams are able to minimize their attack surface and control privileged access to the hybrid enterprise, along with other features that simplify compliance. Components of Centrify Infrastructure Services: Identity Broker – Access & authentication to geo dispersed infrastructure (on-premises & private or public cloud), leveraging identities in AD, LDAP or cloud directories such as Google’s. Adaptive MFA for Privileged Access – Risk-based MFA for admins who access Windows & Linux servers, elevate privilege or leverage privileged creds. Privilege Elevation – Self-service request system facilitates requests for specified roles & time periods - if approved, will automatically revoke that access upon expiration. Shared Account Password Management– Gives internal users, outsourced IT & 3rd party vendors secure, always-on access to critical shared account passwords (maintaining control over who has access, which passwords they use & how those passwords are managed). Privileged Access Request – Temporary, time-bound privileged access to on-premises & cloud-based infrastructure. Secure Remote Access – Secure Privileged Access for On-Site & Remote Administration. Auditing & Reporting – Monitor user activity, conduct forensic investigations & prove compliance. More about Centrify: Centrify delivers Zero Trust Security through the power of Next-Gen Access.  Centrify verifies every user, validates their devices, and limits access and privilege.   Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). 
 Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by top tier investors including Accel Partners, Mayfield, Sigma West, Index Ventures, Samsung Ventures, NTT Docomo and Fortinet.


    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.


    HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach


    So much more than SSO – Cloud Identity Service is a complete Identity and Access Management as a Service (IDaaS). Onboard SaaS apps 100x faster Cloud Identity Service has onboarded SaaS applications 100x faster than legacy on premises IAM environments and can integrate nearly any number and type of identity repositories in 5 easy steps. Reduce IAM costs by up to 60% Eliminate on-premise hardware and software deployment costs, as well as upgrade and maintenance expenses. Cut deployment time up to 75% Without requiring clients to hire and train specialized IAM staff, Cloud Identity Service is deployed up to 75% faster than off-the-shelf identity and access management systems.


    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.


    WSO2 Identity Server provides sophisticated security and identity management of enterprise web applications, services, and APIs, and makes life easier for developers and architects with its hassle-free, minimal monitoring and maintenance requirements. In its latest version, Identity Server acts as an Enterprise Identity Bus (EIB) — a central backbone to connect and manage multiple identities regardless of the standards on which they are based. In addition to using role-based access control (RBAC) convention, fine-grained policy based access control, and SSO bridging to make identity and entitlement management effortless, the all-new version of Identity Server now includes features such as identity token transformation and mediation for seamless integration between internal applications and cloud apps such as Salesforce, Google Apps, and Microsoft Office 365; new user and group provisioning capabilities; and multi-option and multi-step authentication to provide flexibility in selecting authentication options and enable robust multi-factor authentication. • System and User Identity Management • User and Groups Provisioning • Entitlements Management • XACML 2.0/3.0 Support • Lightweight, Developer Friendly and Easy to Deploy • Manage and Monitor


    Empowers users with an intuitive App Launchpad for one-click, single sign-on (SSO) to cloud applications from any device.


    Clearlogin Single Sign-On & Cloud Identity App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features.


    One username. One password. Zero headaches. The PingOne® cloud is an identity-as-a-service (IDaaS) solution that enables organizations to deliver secure cloud single sign-on (SSO) and multi-factor authentication for users with just one username and password—eliminating the multiple password security problem. Recognized by Gartner®, Forrester®, IDC and KuppingerCole, the PingOne cloud delivers one-click access to all of the SaaS, legacy and custom web applications your users need while increasing security for your organization. Get more info: https://www.pingidentity.com/en/products/pingone.html


    AWS Directory Service is a service that setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect AWS resources with an existing on-premises Microsoft Active Directory and can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join Amazon EC2 instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.


    Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

    Get a Quote


    With IdentityNow, SailPoint delivers integrated IAM services from the cloud that automate compliance, provisioning, password management, and access management.


    Built on Force.com with standards-based SSO, 2-factor strong authentication via any mobile device, and account provisioning to hundreds of SaaS apps.

    Get a Quote

    The comprehensive solution for provisioning identities and controlling access.


    SecureAuth IdP streamlines secure access into all applications and resources with one set of credentials; regardless of cloud, mobile, web or VPN resources. IdP enables any device with any identity type to authenticate to any identity store using any VPN to access any application — offering unparalleled choice and flexibility. SecureAuth puts strong adaptive authentication in front of SSO across all applications (on-premises, cloud, mobile and homegrown) to ensure maximum protection without compromising the user experience.


    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.


    Optimal IdM is a global provider of innovative and affordable identity access management solutions. We partner with our clients to provide comprehensive, fully customizable enterprise level solutions that meet the specific security and scalability needs of their organizations. Customers include Fortune 1000 companies, as well as Federal, State and Local Government agencies all over the world. The OptimalCloud is a complete Identity-as-a-Service (IDaaS) solution with delegated administration and workflow capabilities that can be customized to meet the specific needs of its clients. The OptimalCloud offers a private, secure and dedicated cloud which is essential for meeting corporate security and compliance restrictions. Further to that, The OptimalCloud’s built-in cloud reporting system provides real time historical audit record of all activity including detailed granular reporting which is stored in a dedicated private database. The OptimalCloud is billed as an affordable, flat monthly fee which fits with budgetary and approval requirements.


    Workspace ONE is a digital workspace platform that simply and securely delivers and manages any app on any device by integrating access control, application management and multi-platform endpoint management. It is available as a cloud service or for on-premises deployment.

    Get a Quote

    AccessMatrix Universal Access Management (UAM) is a comprehensive web single sign-on (SSO), web access management, federated single sign-on (SSO), externalized authorization management, and hierarchy-based delegated administration system.


    Apache Syncope is an open source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license.

    Get a Quote

    ARCON | Privileged Access Management (PAM) is a comprehensive solution which provides additional security layers to safeguard an enterprise's critical systems and confidential information. The solution helps in mitigating insider and advanced cyber threats. With a host of advanced features, ARCON | PAM suite provides real-time threat alerts, analytics and monitoring that helps in preventing unauthorized access to the systems. The solution essentially provides a robust security framework whilst boosting operational efficiency.

    Get a Quote

    Avatier SSO delivers an enterprise ready single sign-on solution. It enables access to corporate information systems, SaaS applications, and cloud computing services. Avatier SSO leverages a company's existing infrastructure and controls user access based on directory driven authentication.


    Avencis Hpliance is a solution for Identity Management (IAM) designed to define and centralise the management of digital identities.


    Privileged Session Management (PSM) controls privileged user access to your IT systems, neutralizing hacks and offering unprecedented control. PSM is fast to deploy and integrates seamlessly into existing networks, so you can keep compliant with the latest security regulations and realize the ROI of better security quickly.

    Get a Quote

    Increase user productivity and business flexibility with user provisioning & identity management.


    Change Guardian gives you the security intelligence you need to rapidly identify and respond to privileged user activities that could signal a data breach or result in compliance gaps.

    Get a Quote

    For enterprises who need to protect their infrastructure, Conjur software provides proactive security with comprehensive authorization and audit for all IT applications, clouds, and services.


    Core Access Insight is a software that helps to resolve immediate threats with prognostic analytics applied to the big identity and access data in the enterprise, by creating in-depth views of areas of access through visually intuitive heat maps and has a real-time view of the multi-dimensional relationships between identities, access rights, policies, resources, and activities across a multitude of enterprise systems and resources.



    Enterprise Guardian provides a comprehensive identity management platform that evaluates risk to the organization based on the type of access granted and the potential impact it could have.



    Creating a Trusted Workspace for Secure Information Sharing, Collaboration and Process Integration Across Global Networks



    Fischer is a holistic identity governance and administration platform that scales to meet each organization’s needs and delivery preference: on-premises software, manged Identity as a Service® Cloud service, or hosted cloud.


    Fox Technologies is a global security company that helps organizations centralize Linux and Unix access management across hybrid IT environments.

    Get a Quote

    
Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.


    DM365 is a unique identity and access management solution that is designed to make managing systems and governing users simple and cost-effective.


    iWelcome provides Identity & Access Management as-a-Service (IDaaS). With iWelcome’s cloud platform, organisations manage the identity lifecycle, the profiles and the access rights of their consumers, employees & business partners in a user friendly and secure manner. Our platform and organisation are engineered to facilitate the scalability, complexity, privacy and security requirements of medium and large enterprise and government organisations. iWelcome is a 100% European company and resides in European data centres.


    Lieberman RED Rapid Enterprise DefenseTM Identity Management, formerly known as Enterprise Random Password Manager, is a Proactive Cyber Defense Platform. It protects organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks, on-premises, in the cloud and in hybrid environments.

    Get a Quote


    NE Access provides a portal for self-service or third party delegated administration of identity lifecycle process. Non-employees and third party delegated admins can regularly validate identity relationships to ensure access is being governed effectively.

    Get a Quote

    Nervepoint Access Manager is a complete self-service password rest and account unlock tool. It empowers end users to manage their accounts by synchronize across on-premise and cloud systems. It encompasses remote management with it's own dedicated mobile app, available both on iOS and Android.


    Omada Identity Suite provides a dynamic and adaptable yet fully integrated enterprise platform for both identity management and identity governance. Using a step-by-step approach, Omada Identity Suite provides an integrated identity governance and administration solution that includes closed loop auditing processes and advanced reporting.


    The BeyondTrust PowerBroker Privileged Access Management Platform is an integrated solution that provides visibility and control over all privileged accounts and users. By uniting capabilities that many alternative providers offer as disjointed tools, the platform simplifies deployments, reduces costs, improves system security, and reduces privilege risks. Key Solutions Include: ENTERPRISE PASSWORD SECURITY Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution. ENDPOINT LEAST PRIVILEGE Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security. SERVER PRIVILEGE MANAGEMENT Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account. A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems. Learn more at https://www.beyondtrust.com/products/powerbroker/


    Privileged Account Manager allows IT administrators to work on systems without exposing administrator or supervisor passwords, or root-account credentials.


    Radiant Logic spacializes in identity virtualization and develops solutions to deliver simple, logical, and standards-based access to all identity within an organization.

    Get a Quote

    Control privileged users and stop advanced persistent threats.


    SAASPASS is an Integrated Identity & Access Management Solution that provides two-factor authentication-as-a-service and secure single sign-on (SSO) for physical devices, computers and digital applications with integrations and adapters for on-premise, hybrid, custom and cloud applications.


    SAM Enterprise Identity Manager is a tool that offer a full-fledged identity access governance with integrated workflows and password management to significantly boosts the performance of corporate authorization management processes.



    SpectraMSP PAM is purpose-built for providing Password Management Solution as a service and managing access needs of service providers to securely access customer assets from any location. Essential for implementing a sound password management strategy for your security operations, our solution can help integrate with your diverse set of technologies, automate day-to-day tasks and effectively utilize your resources on issues that matter most.

    Get a Quote

    Proactive protection for endpoints, the entry point for 85% of all data breaches. Stop malware and ransomware from exploiting applications by removing local administrative rights from endpoints.


    XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments. Free download and Free Test Drive online. https://www.xtontech.com/try-it-now/


    Kate avatar
    Kate from G2 Crowd

    Learning about Privileged Access Management?

    I can help.
    Get FREE professional recommendations in just a few minutes.