getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


10 software options

JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

visit website
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
Keeper Secrets Manager logo

Infrastructure security platform

learn more
Keeper Secrets Manager is a cloud-based, fully-managed, zero-knowledge platform designed to secure sensitive infrastructure data including access keys, database passwords, API keys, certificates, and other privileged credentials.

Read more about Keeper Secrets Manager

Users also considered
ACME Device Attestation logo

Privileged access management software

learn more
Smallstep offers a Device Identity Platform that secures company resources through hardware-bound credentials backed by ACME Device Attestation. The platform ensures only authorized devices can access sensitive assets like Wi-Fi networks, VPNs, and cloud APIs by binding access to device silicon. Smallstep supports multiple operating systems including MacOS, Windows, and Linux, providing consistent cross-platform security for both enterprise IT and DevOps teams.

Read more about ACME Device Attestation

Users also considered
Rippling logo

Workforce management across HR, finance, and IT. 

learn more
Rippling is a cloud-based workforce management system that helps businesses manage operations across HR, finance, and IT.

Read more about Rippling

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Corma logo

The simplest license & access governance platform

learn more
Corma is the simplest license & access governance platform for modern IT teams.

Read more about Corma

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Zilla Security logo

Cloud security and threat detection platform

learn more
Zilla Security provides on-premises users remote access to their enterprise resources. Employees can access files, messages, and emails from any device while adhering to compliance policies.

Read more about Zilla Security

Users also considered
Akeyless Vault logo

Manage Your Secrets At Infinite Scale.

learn more
Unified Vault platform built to secure DevOps credentials and access to production resources across hybrid cloud and legacy environments.

Read more about Akeyless Vault

Users also considered

Popular privileged access management comparisons