getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software with Threat Intelligence (2026)

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


30 software options

Rippling logo

Workforce management across HR, finance, and IT. 

learn more
Rippling is a cloud-based workforce management system that helps businesses manage operations across HR, finance, and IT.

Read more about Rippling

Users also considered
Cisco Duo logo
Category Leaders

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
Keeper Security logo
Category Leaders

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
GoodAccess logo
Category Leaders

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
ThreatLocker logo

Zero trust cybersecurity platform for enterprise

learn more
ThreatLocker is a Zero Trust cybersecurity platform using a deny-by-default approach. It features application allowlisting to block unauthorized software, Ringfencing™ to contain trusted apps and prevent exploitation, and Network Control to manage port access and block rogue devices. Organizations can ensure compliance with regulations while protecting against threats like ransomware and zero-day vulnerabilities.

Read more about ThreatLocker

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface.

Read more about Perimeter 81

Users also considered
Microsoft Entra ID logo
Category Leaders

Cloud-based identity and access management (IAM) software

learn more
Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) software designed to help enterprises provide protection against cybersecurity attacks through single sign-on (SSO) and multi-factor authentication. It allows administrators to securely engage with internal and external stakeholders and provide on-site and remote access to various applications.

Read more about Microsoft Entra ID

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
Privileged access management focuses on IT admins with unrestricted access to company data, apps and control over access roles of the rest of the organization user access management. The NordLayer solution analyzes and audits internal activities to prevent, isolate and disable any deviations.

Read more about NordLayer

Users also considered
Syteca logo

PAM platform, reinforced with ITDR Intelligence.

learn more
Besides monitoring functionality, Ekran System® provides identity management and access management within a single endpoint agent. The product includes two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and other functions.

Read more about Syteca

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
VaultOne logo

Digital security platform for password & identity management

learn more
VaultOne is an identity and access management software designed to help businesses secure users' credentials and control access permissions to infrastructures, websites, servers, databases, and applications from a centralized platform.

Read more about VaultOne

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
ManageEngine Password Manager Pro logo

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
Tehama logo

Tehama Enclaves as a Service

learn more
Tehama is the industry’s most advanced enclave hosting platform. Tehama securely connects people to sensitive data and systems—without the complexity.
Through secure cloud-native Enclaves, Tehama delivers Zero Trust access, compliance, and governance in one unified platform. No more layering multip

Read more about Tehama

Users also considered
Passly logo

Identity and privileged access management software

learn more
Passly is an identity and access management software designed to help businesses of all sizes handle employee access to corporate resources. It allows IT teams to capture and store passwords for personal or shared accounts, applications, and websites in a centralized repository.

Read more about Passly

Users also considered
Sectona Security Platform logo

Privileged access management to mitigate breaches

learn more
Secona Security Platform provides a single console for securing passwords, secrets and privileged accounts across the enterprise. This enables you to know who has access to what in real-time.

Read more about Sectona Security Platform

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Netwrix Privilege Secure logo

Access management software

learn more
Netwrix SbPAM helps improve IT productivity and service uptime with centralized privileged account management.

Read more about Netwrix Privilege Secure

Users also considered
Imprivata Privileged Access Management logo

Cloud-based privileged access management software

learn more
Xton Access Manager is a cloud-based privileged access management software that helps businesses handle and secure privileged accounts, credentials, and certificates on a centralized platform. Supervisors can configure access permissions and store passwords, keys, or critical documents in an identity vault.

Read more about Imprivata Privileged Access Management

Users also considered
Identity Manager logo

Solution for managing identity governance and administration

learn more
One Identity Cloud PAM Essentials simplifies the management of privileged access by providing a range of advanced features that make the complex world of PAM easier to navigate.

Read more about Identity Manager

Users also considered
SecureONE logo

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Symantec PAM logo

Privileged access management (PAM) platform

learn more
Symantec PAM is a privileged access management (PAM) platform that helps businesses control access to devices and data. Teams can remove hard-coded passwords from applications, configuration files, and scripts to enable secure communications.

Read more about Symantec PAM

Users also considered