Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. PAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups. Learn more about Hitachi ID Bravura Privilege
Compare Devolutions Server и WALLIX Bastion
Take a look at comparison of based on the customers reviews. The rating is calculated in real time from reviews of customers.
Starting price | from 1 usd. | from 1 usd. |
Who this service is for |
Devolutions Server is a full-featured shared account and password management solution, with built-in privileged access components created to meet t... Read more |
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management. |
Rating | ||
Cybersecurity software features |
Behavioral Analytics
|
Behavioral Analytics
|
Privileged Access Management software features |
Application Access Control
Least Privilege
Remote Access Management
|
Application Access Control
Least Privilege
Remote Access Management
|
SIEM software features |
User Activity Monitoring
|
User Activity Monitoring
|
Access Governance software features |
Password Management
Multi-Factor Authentication
|
Password Management
Multi-Factor Authentication
|
Password Management software features |
Credential Management
|
Credential Management
|
Accreditation Management software features |
Access Controls/Permissions
|
Access Controls/Permissions
|
Interface screenshot |
![]() ![]() ![]() |
|
Desktop & Mobile Platforms |
Cloud-hosted / box software |
Cloud-hosted / box software |
Support | Working hours, Online | Working hours, Online |
Training |
Documentation
Webinars
Personal
Online
|
Documentation
Webinars
Personal
Online
|
Reviews |
Great addition for Remote Desktop Manager for enhanced security, but less for smaller companies. Benefits: The ability to use Remote Desktop Manager with your colleagues in a more secure method then by connecting to a sql server directly. Drawbacks: For the smaller companies using the team edition, there is no 2 factor authentication or ip/geo restrictions. Summary: Before Devolutions Password Server we did connect Remote Desktop Manager directly to our SQL server, which is much more insecure then this method. |
Wallis Bastion PAM Benefits: The most important aspect of any PAM solution is the ease of implementing the solution. Since I have experience using other PAM solution . This sol... Read more The most important aspect of any PAM solution is the ease of implementing the solution. Since I have experience using other PAM solution . This solution has the min implementation time compared all the solution available in the market. Drawbacks: Wallis needs to add more features like out of the box integration softand hard tokens like RSA and PKI cards. Summary: Overall experience is good . The solution is very user friendly and has all the necessary features required by a PAM solution. |
Alternative software
rating
4 (
1 reviews
)
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Learn more about Privilege Management for Unix, Linux, and Networked Devices
rating
4.7 (
3 reviews
)
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections. Learn more about System Frontier
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis. Learn more about Instasafe
rating
4 (
1 reviews
)
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments. Learn more about Xton Access Manager
PrivX stands apart from traditional privileged access management (PAM) tools by delivering a lean, cost effective solution. Compared to legacy PAMs, PrivX helps you to: Cut the costs of password lifecycle management and vaulting by granting short-lived authentication to users only when they need it. Economize on deployment and maintenance efforts by avoiding the use of agents on your client workstations and hosts. Learn more about PrivX
Manage, monitor, and control access to your systems, equipment, facilities, and all other critical data. Users can submit an access request that triggers built-in approval workflow. Excellent tool for employee Onboarding. Learn more about Security Access Request Manager
The Ignimission Protec solution helps accelerate the deployment and enhance the value of PAM projects with CyberArk. We manage the entire CyberArk application lifecycle, from project initiation to operations and migration. Learn more about Ignimission Protec
BigID.me brings data trust and transparency to your customers with easy, intuitive, and proactive privacy management. Learn more about BigID.me
Software suite that provides full compliance to organizations. Learn more about ProfileTailor
Password server takes what is great about RDM for a single user and expands it to an entire team (s)
Benefits:
RDM is incredibly useful for managing multiple type of connections (RDP, VPN, SSH, etc) and the credentials required to use them. Password server ... Read more
RDM is incredibly useful for managing multiple type of connections (RDP, VPN, SSH, etc) and the credentials required to use them. Password server provided a central repository for all of this information that is auditable with granular controls for access, edits, and similar. Need to give one user access to a single tree of credentials and connections you can. Need to recover something that some changed incorrectly back to prior value, you can. Need to recover something someone deleted but should not have, you can. Password Server makes the RDM client a powerhouse for a team or organization by holding all the keys securely and using best practices for Privileged Access Management.
Drawbacks:
Frequent switching between VPN connections cause the server to be "offline" from client perspective and can freeze the client while it finds the pa... Read more
Frequent switching between VPN connections cause the server to be "offline" from client perspective and can freeze the client while it finds the path back to the server. You can proactively toggle to offline (if allowed by system admin) and then when done toggle back on and avoid the issue but remembering to do so is the problem.
Summary:
As a distributed consulting (ERP ISV) practice we have multiple people who need access to privileged information about systems, passwords, and conn... Read more
As a distributed consulting (ERP ISV) practice we have multiple people who need access to privileged information about systems, passwords, and connections. Having a central (on-line and if allowed offline) secure repository that can be accessed from any platform allows consultants to know where to go to get information to help drive successful results more quickly and effectively which make us more valuable to our clients. It provides a professional touch that many firms of our size do not have and is a differentiator in the market.