15 years helping South African businesses
choose better software

Privileged Access Management Software

Privileged Access Management software prevents unauthorized access to critical enterprise systems by ensuring appropriate access level is established and maintained for various individuals, applications, and devices.

Featured software

Most reviewed software

Explore the most reviewed products by our users on the Privileged Access Management Software

A privileged access management (PAM) solution that allows you to handle all requests with ease and strengthen your endpoint security. Learn more about Heimdal Privileged Access Management
A PAM solution that gives system administrators complete visibility into each endpoint’s access rights from either the dashboard or mobile app. With this convenient setup, admins are able to view user requests, check request history, approve or decline escalation requests on the go, and block elevations. Enable Zero-trust execution or revoke local admin rights with a simple click. This effectively stops malicious insider threats from taking over your network and boosts your security. Learn more about Heimdal Privileged Access Management

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Role based access control for Windows, Linux and network device management. Dynamically create web forms for PowerShell without HTML. Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections. Learn more about System Frontier

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
ADManager Plus is a unified hybrid Active Directory, Microsoft 365, Exchange, and Google Workspace management and reporting solution. Learn more about ManageEngine ADManager Plus
ADManager Plus is a unified hybrid Active Directory, Microsoft 365, Exchange, and Google Workspace management and reporting solution that helps in granting JIT access, granular access control, remote access, and privileged group membership management. It helps with managing users’ file server access permissions along with identifying and granting only the least privileges needed. It also offers 200 reports, including reports to find privileged users' group memberships. Learn more about ManageEngine ADManager Plus

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Veriato offers predictive behavior intelligence built with AI to help organizations manage insider risk and monitor employee activity. Learn more about Veriato Workforce Behavior Analytics
Veriato has reinvented the category it created, using AI based user behavior analytics to help companies prevent risks and increase productivity in their remote, hybrid and in-office environments. Veriato’s platform offers solutions for Insider Risk Management (IRM), behavioral analytics, user activity monitoring (UAM) and data loss prevention (DLP) in a single powerful platform. Veriato delivers monitoring, alerts, reporting and screenshots, allowing customers to be predictive and proactive rather than reactive, critical in cybersecurity. The platform helps global Enterprises, SMBs and Government entities become more engaged, productive and safe. Learn more about Veriato Workforce Behavior Analytics

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
ADAudit Plus is Active Directory, Azure AD, Windows Server, file server (including NAS devices), and workstation auditing software. Learn more about ManageEngine ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides complete visibility into all the activities across your Active Directory (AD), Azure AD, file servers (Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations. ADAudit Plus helps you track user logon and logoff activity; analyze account lockouts; audit ADFS, ADLDS, and printers; monitor privileged user activities; and do much more. Learn more about ManageEngine ADAudit Plus

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
ManageEngine PAM360 Complete privileged access security for enterprise IT Learn more about ManageEngine PAM360
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security. Learn more about ManageEngine PAM360

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Stop ransomware with endpoint controls including Allowlisting and Ringfencing app containment. Learn more about ThreatLocker
For IT Professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security. Change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enable a Zero Trust posture at the endpoint to block attacks that live off the land. Learn more about ThreatLocker

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
BeyondTrust Remote Support (formerly Bomgar Remote Support) securely accesses and supports any device or system, anywhere in the world.
BeyondTrust Remote Support (formerly Bomgar Remote Support) enables secure, instant remote support to customers using Windows, Mac, Android, iOS, or other devices, whether or not they are on the corporate network. Users can fix end systems or troubleshoot issues using screen sharing, remote control, unattended access, file sharing, annotations, and mobile device camera sharing. Real-time chat, canned scripts, collaboration and escalation tools improve technician efficiency. Learn more about BeyondTrust Remote Support

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Cloud-based solution that helps businesses manage workforce via multi-factor authentication, meta-directory, single sign-on and more.
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com. Learn more about Okta

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft.
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats.
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Small businesses can use Keeper as a 3-in-1 solution for password management, SSO, and PAM. Large enterprises can use it in combination with a dedicated PAM solution seamlessly. Learn more about Keeper Security

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Take care of your privileged access management needs with JumpCloud’s conditional access policies, multi-factor authentication (MFA), and visibility into access attempts and other user activities. Learn more about JumpCloud Directory Platform

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
SecureLink is the leader in providing privileged access management for vendors for both enterprise organizations and technology vendors
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink's secure, purpose-built platform. SecureLink is headquartered in Austin, Texas. Learn more about SecureLink

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.
Bitwarden is an open source solution that uses end-to-end encryption to store all of your company’s credentials in one secure location. Administrators can easily manage access to important applications by setting permissions on an individual or group basis. Quickly identify security risks and unauthorized access with exportable activity logs. Connect your Bitwarden organization to your existing directory service to automatically provision and de-provision accounts. Learn more about Bitwarden

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
LogMeOnce Password Management & IAM software helps to effectively protect and manage passwords for teams, businesses, and enterprises.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team. LogMeOnce helps you to transform your business, improve security, and reduce support cost. The powerful features of LogMeOnce improve security and take away frustration. Our security platform protects your teams and IT administrators. Our best practices help to protect your companys brand and identity. Learn more about LogMeOnce

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Secure your team's access to cloud resources, servers, or corporate databases in 10 minutes. Try 14 days full-featured trial.
GoodAccess creates a secure and encrypted network infrastructure that hides your critical services and assets from the internet and comes with a fully automated deployment that takes 10 minutes. With GoodAccess, you can control access on an application level to users who are authenticated and authorized to use them. Do not let any device or user access systems and data only based on the fact that they are connected to the trusted network. Learn more about GoodAccess

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
With OneLogin Identity Lifecycle Management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Security policy enforcement and context aware adaptive authentication ensure only authorized users get access to valuable data. Learn more about OneLogin

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge.
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution. Learn more about Passportal

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation. Learn more about Ivanti Connect Secure

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Teramind tracks employee behavior, detects threats, and optimizes your business for productivity with advanced employee monitoring.
Discover Teramind - the ultimate tool for businesses looking to optimize productivity, streamline workflows, and protect assets. Our customizable platform ensures regulatory compliance, detects and prevents insider threats, and monitors remote employees. Automated actions keep your business secure and efficient, while real-time alerts and logs provide all-around security. Experience the power of machine-learned behavior analytics to secure your company data. Ready to revolutionize your business? Learn more about Teramind

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Perimeter 81 is a leading network cybersecurity solution offering secure remote access.
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface. Secure your organization with both agent and agentless access as well as advanced security features such as device posture security and multi-factor authentication, ensuring access to only those you trust. Learn more about Perimeter 81

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Auth0 by Okta takes a modern approach to identity, enabling organizations to provide secure access to any application.
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity, extensibility, and expertise to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework. Learn more about Auth0

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours? Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others. Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS). Apply multi email signatures and send bulk vacation messages. Join thousands of users and improve your company's security and control. Learn more about Conecta Suite

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
Azure Active Directory, part of Microsoft Entra, is a universal identity management and security platform with single sign-on and MFA.
Azure Active Directory (Azure AD) enterprise identity service, part of Microsoft Entra, provides single sign-on and multi-factor authentication (MFA) to help protect users from 99.9% of cybersecurity attacks. You get SSO, CA, a single identity platform, developer tools, and more. Learn more about Azure Active Directory

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management
We deliver intelligent identity solutions that enable companies to balance security and personalized, streamlined user experiences.
We believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. Enterprises leverage our best-in-class identity solutions with 3rd party services they already use to remove passwords, prevent fraud, support Zero Trust, and anything in between. This is accomplished through a no-code, drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping Identity to protect digital interactions and make experiences frictionless. Learn more about Ping Identity

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Application Access Control
  • Compliance Management
  • User Session Management