App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Privileged Access Management Software

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

120 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Zilla Security logo

Cloud security and threat detection platform

visit website
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
ManageEngine PAM360 logo

Complete privileged access security for enterprises

visit website
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
Heimdal Privileged Access Management logo

Escalate and de-escalate user rights and manage permissions.

visit website
Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline them on the go. Available in both the dashboard tab and on mobile, it is the ideal tool for full granular visibility into the company network.

Read more about Heimdal Privileged Access Management

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

visit website
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
Netwrix Privilege Secure logo

Access management software

visit website
Netwrix SbPAM helps improve IT productivity and service uptime with centralized privileged account management.

Read more about Netwrix Privilege Secure

Users also considered
Bitwarden logo

The Most Trusted Open Source Password Manager for Business

visit website
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.

Read more about Bitwarden

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

visit website
ManageEngine ADManager Plus is a wholesome yet simple-to-use, web-based Active Directory management solution that makes day-to-day AD management immensely easy. The intuitive user interface of the product gets rid of the monotony in using native AD tools.

Read more about ManageEngine ADManager Plus

Users also considered
Ekran System logo

Enterprise-grade User Activity Monitoring & PAM solution

visit website
Besides monitoring functionality, Ekran System® provides identity management and access management within a single endpoint agent. The product includes two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and other functions.

Read more about Ekran System

Users also considered
System Frontier logo

Customer identity and access management software

visit website
System Frontier is a customer identity and access management software designed to help businesses in the healthcare, transportation, utilities, finance, and other sectors manage user access across Windows servers and workstations. Administrators can control and gain visibility into actions, tasks, and changes executed in a sandbox environment.

Read more about System Frontier

Users also considered
BeyondTrust Remote Support logo

Secure remote access software

learn more
BeyondTrust Remote Support enables help desk teams to quickly and securely access and fix any remote device, running any platform, located anywhere in the world through one solution.

Read more about BeyondTrust Remote Support

Users also considered
Okta logo

On-demand identity & access management for enterprise

learn more
Okta is The World’s Identity Company™. We free everyone to safely use any technology — anywhere, on any device or app.

Read more about Okta

Users also considered
Duo Security logo

User identity verification & device vulnerability discovery

learn more
Duo Security provides a Trusted Access platform offering multiple two-factor authentication methods, mobile apps, and an Access Gateway for Single Sign-On (SSO)

Read more about Duo Security

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
LogMeOnce logo

Password and identity management solution

learn more
LogMeOnce is a cloud-based password and identity management solution that helps businesses of all sizes manage login credentials, provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.

Read more about LogMeOnce

Users also considered
GoodAccess logo

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface.

Read more about Perimeter 81

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Teramind logo

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
SecureLink logo

Vendor access management and remote support

learn more
SecureLink is a vendor privileged access management solution for technology enterprises and vendors which offers features such as role-based permissions, audit logs, compliance management, self registration, desktop sharing, remote support, file transfer, and more

Read more about SecureLink

Users also considered
ThreatLocker logo

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
Veriato Workforce Behavior Analytics logo

Insider Risk Management & User Activity Monitoring

learn more
Veriato offers predictive behavior intelligence built with AI to help organizations manage insider risk and monitor employee activity in their remote, hybrid and in-office environments.

Read more about Veriato Workforce Behavior Analytics

Users also considered
Conecta Suite logo

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
Passportal logo

Encrypted cloud-based, automated password protection

learn more
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities

Read more about Passportal

Users also considered
Auth0 logo

Secure access for everyone. But not just anyone.

learn more
Auth0 gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity and extensibility to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.

Read more about Auth0

Users also considered