App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Privileged Access Management Software with Activity Monitoring

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

15 software options

Sponsored

Personalize your search

Any industry

Any business size

Duo Security logo
4.7
(511)

User identity verification & device vulnerability discovery

learn more
Duo Security provides a Trusted Access platform offering multiple two-factor authentication methods, mobile apps, and an Access Gateway for Single Sign-On (SSO)

Read more about Duo Security

Users also considered
JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

learn more
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Perimeter 81 logo
4.8
(70)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface.

Read more about Perimeter 81

Users also considered
SecureLink logo
4.2
(177)

Vendor access management and remote support

learn more
SecureLink is a vendor privileged access management solution for technology enterprises and vendors which offers features such as role-based permissions, audit logs, compliance management, self registration, desktop sharing, remote support, file transfer, and more

Read more about SecureLink

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
Privileged access management focuses on IT admins with unrestricted access to company data, apps and control over access roles of the rest of the organization user access management. The NordLayer solution analyzes and audits internal activities to prevent, isolate and disable any deviations.

Read more about NordLayer

Users also considered
ManageEngine Password Manager Pro logo
4.4
(23)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
Akeyless Vault logo
4.6
(7)

Manage Your Secrets At Infinite Scale.

learn more
Unified Vault platform built to secure DevOps credentials and access to production resources across hybrid cloud and legacy environments.

Read more about Akeyless Vault

Users also considered
Appgate SDP logo
5.0
(4)

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
CleanCloud by SEK logo
5.0
(3)

A cloud computing management tool

learn more
CleanCloud is a cloud computing management tool that offers integration with Azure, AWS, and Google Cloud. It provides an overview of vulnerable items, analyzes all cloud resources, monitors critical assets, and performs audits that detail each identified event. Available in Portuguese and English.

Read more about CleanCloud by SEK

Users also considered
Twingate logo
5.0
(2)

Secure work, anywhere

learn more
Twingate makes it easy for organizations to adopt a Zero Trust architecture, replacing corporate VPNs with a more secure and usable solution.

Read more about Twingate

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
strongDM logo
(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Securden logo
(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
ManageEngine Application Control Plus logo
(0)

Endpoint protection tool for security teams.

learn more
ManageEngine Application Control Plus is a cloud-based and on-premise software that enables businesses to gain control over software usage and mitigate security risks.

Read more about ManageEngine Application Control Plus

Users also considered