getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software

Last updated: April 2026

108 software options

ManageEngine PAM360 logo

Privileged access management software

visit website
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Heimdal Privileged Access Management logo

Escalate and de-escalate user rights and manage permissions.

visit website
Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline them on the go. Available in both the dashboard tab and on mobile, it is the ideal tool for full granular visibility into the company network.

Read more about Heimdal Privileged Access Management

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

visit website
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
Okta logo

On-demand identity & access management for enterprise

visit website
Okta Privileged Access provides unified access and governance for privileged resources – whether on-prem or cloud – and increases visibility, compliance and security without compromising user experience.

Read more about Okta

Users also considered
Keeper Security logo

Secure password management and digital vault.

visit website
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
Bitwarden logo

The Most Trusted Open Source Password Manager for Business

visit website
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.

Read more about Bitwarden

Users also considered
Netwrix Privilege Secure logo

Access management software

visit website
Netwrix SbPAM helps improve IT productivity and service uptime with centralized privileged account management.

Read more about Netwrix Privilege Secure

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

visit website
ADManager Plus enhances PAM by streamlining Active Directory, M365, and Google Workspace control. It uses detailed reporting and risk assessment, and risk exposure management (with visual attack paths to privileged entities) to identify high-risk access, supporting secure delegation and compliance.

Read more about ManageEngine ADManager Plus

Users also considered
Foxpass logo

Linux server & Wifi Access Control

visit website
The top IAM system for engineers & technical staff: We help you ensure only the correct individuals have access to servers, devices and networks and only for the duration required. This mitigates security breaches by internal or external people.

Read more about Foxpass

Users also considered
Devolutions PAM logo

Privileged access management solution

visit website
Devolutions PAM is a privileged access management solution designed to control, monitor, and secure elevated access across organizations. The platform offers features including privileged account discovery, automatic password rotation, checkout request approval, and just-in-time privilege elevation. It integrates with enterprise systems while providing detailed administrative reports and auditing capabilities for enhanced security compliance.

Read more about Devolutions PAM

Users also considered
Genea Security logo

Cloud Physical security solution for buildings & enterprises

visit website
Genea Access Control is a cloud-based access control platform that provides physical security to buildings and enterprises. The solution includes mobile-based access control, visitor management, access logs, out of the box integrations, non-proprietary access control hardware, 24/7 support & more.

Read more about Genea Security

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden Unified PAM is a privileged access security solution that lets you discover, store, share, manage privileged credentials.

Read more about Securden

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Klarytee logo

Data-centric Governance Platform.

learn more
Data-centric Governance Platform. Visibility. Protection. Control. For AI & Beyond.

Read more about Klarytee

Users also considered
ManageEngine AD360 logo

Identity and access management platform

learn more
ManageEngine AD360 is an enterprise IAM software solution that helps businesses of all sizes manage identities securely and ensure compliance. Key functionalities include automated identity lifecycle management, secure single sign-on, adaptive multi-factor authentication, approval-based workflows.

Read more about ManageEngine AD360

Users also considered
Imprivata Privileged Access Management logo

Cloud-based privileged access management software

learn more
Xton Access Manager is a cloud-based privileged access management software that helps businesses handle and secure privileged accounts, credentials, and certificates on a centralized platform. Supervisors can configure access permissions and store passwords, keys, or critical documents in an identity vault.

Read more about Imprivata Privileged Access Management

Users also considered
KPMG Sofy Suite logo

Software for streamlining governance, risk, and compliance

learn more
Sofy Suite simplifies Governance, Risk, and Compliance (GRC) with automated tools for compliance, audits, risk, and data management. Enhance efficiency, reduce costs, and scale operations with real-time insights and seamless workflows tailored to your business needs.

Read more about KPMG Sofy Suite

Users also considered
BeyondTrust Endpoint Privilege Management logo

Privileged access management software

learn more
BeyondTrust Endpoint Privilege Management is a privileged access management software that helps businesses define policies, control application usage, and manage access controls. Administrators can securely login via single sign-on (SSO) functionality to handle audit activities, and manage group policies.

Read more about BeyondTrust Endpoint Privilege Management

Users also considered
Ezeelogin logo

On-premises SSH jump server solution.

learn more
Ezeelogin is an on-premises SSH jump server solution designed to securely manage access to Linux servers, routers, switches and cloud instances. It offers various features including two-factor authentication, SAML authentication, SSH session recording, identity and access management (IAM), privileged access management (PAM), SSH key rotation, and root password management.

Read more about Ezeelogin

Users also considered
Corpia logo

Identity & access management solution across IT environments

learn more
Corpia automates identity and access management operations to help organizations govern user identities and access privileges. It maintains access permissions through the user lifecycle, enforces access request policies, and provides auditing to ensure regulatory compliance. Corpia IGA integrates with ERPs, platforms, and applications to automate provisioning. Key features include access certification, role management, self-service portals, and analytics reporting.

Read more about Corpia

Users also considered
Teramind logo

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Keeper Secrets Manager logo

Infrastructure security platform

learn more
Keeper Secrets Manager is a cloud-based, fully-managed, zero-knowledge platform designed to secure sensitive infrastructure data including access keys, database passwords, API keys, certificates, and other privileged credentials.

Read more about Keeper Secrets Manager

Users also considered
CipherTrust Data Security Platform logo

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
ScreenConnect logo

Remote meeting platform for resolving customers' queries

learn more
ScreenConnect is a help desk solution that allows businesses to detect and resolve customer queries through remote monitoring capabilities. Agents can prevent potential cyberthreats & protect data via features such as AES-256 encryption and two-factor authentication.

Read more about ScreenConnect

Users also considered

Popular privileged access management comparisons