108 results
Why Capterra is free
Cloud-based tool that helps businesses of all sizes manage users' profiles such as authentication details, locations, devices and more. Learn more about Auth0
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity, extensibility, and expertise to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework. Learn more about Auth0
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Small businesses can use Keeper as a 3-in-1 solution for password management, SSO, and PAM. Large enterprises can use it in combination with a dedicated PAM solution seamlessly. Learn more about Keeper Business
Keeper is the leading Password Security Platform for preventing password-related data breaches and cyberthreats. Small businesses can use Keeper as a 3-in-1 solution for password management, SSO, and...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Role based access control for Windows, Linux and network device management. Dynamically create web forms for PowerShell without HTML. Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections. Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform. Learn more about ManageEngine EventLog Analyzer
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about ManageEngine EventLog Analyzer
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
ADManager Plus is a web-based, unified privileged access management solution for Active Directory, Office 365 & Exchange environments. Learn more about ManageEngine ADManager Plus
ADManager Plus is a web-based, unified privileged user access management solution for Active Directory, Office 365, Exchange, and G Suite. It simplifies user identity and credential provisioning, granular access control, remote access, and privileged group membership management. It helps manage users¿ file server access permissions, identify and grant only the least privileges needed. It also offers 150+ reports including reports to find privileged users¿ group membership, and file permissions. Learn more about ManageEngine ADManager Plus
ADManager Plus is a web-based, unified privileged user access management solution for Active Directory, Office 365, Exchange, and G Suite. It simplifies user identity and credential provisioning,...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Duo Security's multi-factor authentication gives your users easy, one-tap access to applications, securing against credential theft. Learn more about Duo Security
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all applications for any user and device, from anywhere. Duo's multi-factor authentication (MFA) solution is easy to use, administer and deploy, while providing complete endpoint visibility and control. This combination of user and device trust builds the foundation for a zero-trust security model. Learn more about Duo Security
Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based trusted access solution protects access to all application...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge. Learn more about Passportal
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution. Learn more about Passportal
N-able Passportal is an encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software. Learn more about ManageEngine ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ManageEngine ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secure your team's access to cloud resources, servers, or corporate databases in 10 minutes. Try 14 days full-featured trial. Learn more about GoodAccess
GoodAccess creates a secure and encrypted network infrastructure that hides your critical services and assets from the internet and comes with a fully automated deployment that takes 10 minutes. With GoodAccess, you can control access on an application level to users who are authenticated and authorized to use them. Do not let any device or user access systems and data only based on the fact that they are connected to the trusted network. Learn more about GoodAccess
GoodAccess creates a secure and encrypted network infrastructure that hides your critical services and assets from the internet and comes with a fully automated deployment that takes 10 minutes. With...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Perimeter 81 provides secure access to local network, applications and cloud infrastructures with one unified platform. Learn more about Perimeter 81
Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative platform simply secures access to your local networks, cloud infrastructures, and business applications, with one unified platform. Learn more about Perimeter 81
Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative platform simply secures access to your local networks, cloud infrastructures,...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
BeyondTrust Remote Support (formerly Bomgar Remote Support) securely accesses and supports any device or system, anywhere in the world.
BeyondTrust Remote Support (formerly Bomgar Remote Support) enables secure, instant remote support to customers using Windows, Mac, Android, iOS, or other devices, whether or not they are on the corporate network. Users can fix end systems or troubleshoot issues using screen sharing, remote control, unattended access, file sharing, annotations, and mobile device camera sharing. Real-time chat, canned scripts, collaboration and escalation tools improve technician efficiency.
BeyondTrust Remote Support (formerly Bomgar Remote Support) enables secure, instant remote support to customers using Windows, Mac, Android, iOS, or other devices, whether or not they are on the...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Cloud-based solution that helps businesses manage workforce via multi-factor authentication, meta-directory, single sign-on and more.
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure.
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
SecureLink is the leader in providing privileged access management for vendors for both enterprise organizations and technology vendors
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink's secure, purpose-built platform. SecureLink is headquartered in Austin, Texas.
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities, their devices, and apply Zero Trust principles.
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere. JumpClouds mission is to Make Work Happen, providing simple, secure access to...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
With OneLogin Identity Lifecycle Management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Security policy enforcement and context aware adaptive authentication ensure only authorized users get access to valuable data.
With OneLogin Identity Lifecycle Management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchroniz...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Bitwarden is the only open source cross-platform password manager that can be used at home, on the go, or at work.
Bitwarden, the most trusted open source password manager, helps organizations enhance security of storing, sharing and receiving their private data online. By integrating with your user directory, multiple hosting options and Single Sign-On feature, it gives your company both flexibility and mobility you need in times like these. Combined with its affordable pricing, Bitwarden just gives you more bang for your buck.
Bitwarden, the most trusted open source password manager, helps organizations enhance security of storing, sharing and receiving their private data online. By integrating with your user directory,...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Ping Identity (NYSE: PING) offers intelligent identity capabilities like SSO and MFA for workforce, customer and partner use cases.
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity (TM) platform provides customers, employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale.
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Website monitoring system that enables businesses security against malware for websites and web-based applications.
Website monitoring system that enables businesses security against malware for websites and web-based applications.
Website monitoring system that enables businesses security against malware for websites and web-based applications.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
LogMeOnce Password Management & IAM software helps to effectively protect and manage passwords for teams, businesses, and enterprises.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team. LogMeOnce helps you to transform your business, improve security, and reduce support cost. The powerful features of LogMeOnce improve security and take away frustration. Our security platform protects your teams and IT administrators. Our best practices help to protect your companys brand and identity.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team....

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
We provide a way to grant access to your wireless and LAN networks, as well as your Linux servers, and only for the duration needed
Free Trial Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need. Also, we provide SSH Key Management and enforcement.
Free Trial Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need. Also, we provide SSH Key Management and enforcement.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud.
Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. Available in on-premises and cloud editions, Secret Server is feature-rich and user-friendly. Additionally, the available Secret Server SDK protects privileges used in the DevOps environment with the same security best practices and management tools used throughout the enterprise, while maintaining the velocity and scale DevOps teams demand.
Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. Available in on-premises and cloud editions,...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
HelloID puts the power of Identity Management into your hands with user provisioning, self-service workflows, and Single Sign-On.
HelloID puts the power of Identity Management into your hands. With user account provisioning, self-service workflows, and single sign-on, you can give your users streamlined application access and self-service capabilities no matter where they are in the world. Configurable workflows and dynamic forms let you customize HelloID to fit your organization’s unique needs.
HelloID puts the power of Identity Management into your hands. With user account provisioning, self-service workflows, and single sign-on, you can give your users streamlined application access and...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Passly helps IT teams and MSPs overcome employees' bad password habits by combining SSO, MFA, and Password Management all-in-one.
Passly helps IT teams needing to do more with less and MSPs seeking greater profitability to overcome employees' bad password habits by seamlessly integrating single-sign on, multi-factor authentication, and password vault/management all into one solution so that you can secure your workforce simply, easily, and affordibly. Get a demo today. - Passly was previously named AuthAnvil. All functionalities from AuthAnvil are included in Passly offering.
Passly helps IT teams needing to do more with less and MSPs seeking greater profitability to overcome employees' bad password habits by seamlessly integrating single-sign on, multi-factor authenticati...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
The Ekran System PAM solution allows you to secure remote access to critical endpoints, control access requests and permissions.
The Ekran System® PAM solution allows you to secure remote access to critical endpoints, get full visibility over all privileged accounts, granularly control access requests and permissions, and ensure compliance. Ekran System's key features include privileged access and session management via jump box, password management, and an access request and approval workflow. Get maximum PAM capabilities for a reasonable price with Ekran System.
The Ekran System® PAM solution allows you to secure remote access to critical endpoints, get full visibility over all privileged accounts, granularly control access requests and permissions, and...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Ensure the right level of access to resources for the appropriate people.
VaultOne blocks unauthorized access to corporate systems, ensuring that the appropriate level of access is established and maintained for diverse people, applications and devices. Its enables its users to work securely wherever they are, through secure remote access.
VaultOne blocks unauthorized access to corporate systems, ensuring that the appropriate level of access is established and maintained for diverse people, applications and devices. Its enables its...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Deliver integrated privilege management components for securing dynamic remote workforce access across on-premises or cloud workloads.
ectona is a Privileged Access Management company that helps enterprises mitigate risk of targeted attacks to privileged accounts spread across data centers & cloud. Sectona with its light, integrated approach provides a single console for securing passwords & secrets in embedded vault, secure access with cross-platform access technology & manage privileges over endpoints. Sectonas extended platform capability supports JIT privilege access for implementing zero standing privileges.
ectona is a Privileged Access Management company that helps enterprises mitigate risk of targeted attacks to privileged accounts spread across data centers & cloud. Sectona with its light, integrated...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
One click network security solution/SASE for in-office, distributed work, & remote work.
Privatise is a cloud firewall, DNS filter & secure remote access tool that can be deployed on any device with no hardware needed. No matter what location, all devices share the same, highly secure cloud network that go out to the public internet through the same dedicated gateway IP.
Privatise is a cloud firewall, DNS filter & secure remote access tool that can be deployed on any device with no hardware needed. No matter what location, all devices share the same, highly secure...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Genea's Access Control platform provides identity management through process automation, scalable control and compliance.
Imagine having total oversight…worldwide. Genea Access Control gives IT and security teams exactly that. With cloud technology, admins can view activity across their entire system. Zero-in on access alerts using an innovative Global Dashboard. Integrate with third-party software for quicker provisioning and heightened security. Create, schedule and automate door plans. And with features like Safe Workplace and Visitor Management, admins can ensure health safety and security for everybody.
Imagine having total oversight…worldwide. Genea Access Control gives IT and security teams exactly that. With cloud technology, admins can view activity across their entire system. Zero-in on access...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secure access to networks, servers and applications using multi-factor authentication with software and hardware authentication methods
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
BeyondTrust Password Safe centralizes the management and control of all privileged account credentials.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprises. It can discover, manage, audit, and monitor privileged accounts of all types.
PasswordSafe is a Privileged Access Management (PAM) solution that unifies password and session management for seamless accountability and control over privileged accounts in cross-platform enterprise...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
PHP security app which monitors logins to detect and block password sharing via GeoTracking.
PHP security app which monitors logins to detect and block password sharing via GeoTracking.
PHP security app which monitors logins to detect and block password sharing via GeoTracking.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis.
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis.
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secure, store and control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data.
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault's main use cases include: - Secrets Management - Identity Brokering - Data Encryption
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
On-premises privileged account management platform featuring robust role-based access control for all your admin users.
Devolutions Server is a full-featured shared account and password management solution, with built-in privileged access components created to meet the ever-expanding security requirements of SMBs. It is fast to deploy and easy to implement and has all the basic features required for a PAM solution while remaining very affordable. When used in combination with Remote Desktop Manager, Devolutions Server forms a robust, privileged account and session management tool integrating over 150+ tools.
Devolutions Server is a full-featured shared account and password management solution, with built-in privileged access components created to meet the ever-expanding security requirements of SMBs. It...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Manage and audit access rights across your IT infrastructure to mitigate insider threats and data loss.
SolarWinds Access Rights Manager (ARM) helps administrators quickly & easily provision, deprovision, manage, and audit user access rights to systems. By analyzing user authorizations and access permissions, you get visualization of who has access to what, and when they accessed it. Reports can easily be generated to demonstrate compliance with many regulatory requirements. Provision and deprovision users via role-specific templates to assure audit conformity in alignment with security policies.
SolarWinds Access Rights Manager (ARM) helps administrators quickly & easily provision, deprovision, manage, and audit user access rights to systems. By analyzing user authorizations and access...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secure remote access and privileged session management software
ManageEngine Access Manager Plus is a secure remote access solution that enables granular, role-based privileged access to critical systems, monitors and records all privileged sessions; and provides real-time control over every remote session.
ManageEngine Access Manager Plus is a secure remote access solution that enables granular, role-based privileged access to critical systems, monitors and records all privileged sessions; and provides...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Azure Active Directory is your universal platform to manage and secure identities.
Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9% of cybersecurity attacks. You get SSO, CA, a single identity platform, developer tools.
Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9% of cybersecurity attacks. You get SSO, CA,...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats.
Available as a virtual appliance, it enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats.
Available as a virtual appliance, it enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
XTAM is a privileged account management software with a password vault, password rotation, session recording and task automation.
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments.
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure.
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure.
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Secure access to elevated privileges, including administrator accounts and security groups.
Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. PAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups.
Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Remediant software reduces your attack surface and prevents lateral movement attacks by scanning and removing privileged access sprawl
Remediant SecureONE enables dynamic discovery and removal of always available admin access sprawl from systems. You can add back privileged access as needed, Just-in-Time (JIT) to enable Zero Standing Privilege (ZSP) and mandate MFA to implement Zero Trust security. This reduces the attack surface and prevents lateral movement of attacks such as ransomware and phishing by applying the principle of least privilege. SecureONE is simple to deploy and manage as it is agentless.
Remediant SecureONE enables dynamic discovery and removal of always available admin access sprawl from systems. You can add back privileged access as needed, Just-in-Time (JIT) to enable Zero...

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises.
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises.
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises.

Features

  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Access Controls/Permissions
  • Least Privilege
  • Application Access Control