getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Applications for Android

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


41 software options

ManageEngine PAM360 logo

Privileged access management software

visit website
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Bitwarden logo

The Most Trusted Open Source Password Manager for Business

visit website
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.

Read more about Bitwarden

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

visit website
ADManager Plus enhances PAM by streamlining Active Directory, M365, and Google Workspace control. It uses detailed reporting and risk assessment, and risk exposure management (with visual attack paths to privileged entities) to identify high-risk access, supporting secure delegation and compliance.

Read more about ManageEngine ADManager Plus

Users also considered
Genea Security logo

Cloud Physical security solution for buildings & enterprises

visit website
Genea Access Control is a cloud-based access control platform that provides physical security to buildings and enterprises. The solution includes mobile-based access control, visitor management, access logs, out of the box integrations, non-proprietary access control hardware, 24/7 support & more.

Read more about Genea Security

Users also considered
Rippling logo

Workforce management across HR, finance, and IT. 

learn more
Rippling is a cloud-based workforce management system that helps businesses manage operations across HR, finance, and IT.

Read more about Rippling

Users also considered
ScreenConnect logo

Remote meeting platform for resolving customers' queries

learn more
ScreenConnect is a help desk solution that allows businesses to detect and resolve customer queries through remote monitoring capabilities. Agents can prevent potential cyberthreats & protect data via features such as AES-256 encryption and two-factor authentication.

Read more about ScreenConnect

Users also considered
BeyondTrust Remote Support logo

Secure remote access software

learn more
BeyondTrust Remote Support enables help desk teams to quickly and securely access and fix any remote device, running any platform, located anywhere in the world through one solution.

Read more about BeyondTrust Remote Support

Users also considered
Okta logo
Category Leaders

On-demand identity & access management for enterprise

learn more
Okta Privileged Access provides unified access and governance for privileged resources – whether on-prem or cloud – and increases visibility, compliance and security without compromising user experience.

Read more about Okta

Users also considered
Cisco Duo logo
Category Leaders

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
Keeper Security logo
Category Leaders

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
LogMeOnce logo

Password and identity management solution

learn more
LogMeOnce is a cloud-based password and identity management solution that helps businesses of all sizes manage login credentials, provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.

Read more about LogMeOnce

Users also considered
GoodAccess logo
Category Leaders

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
Auth0 logo

Secure access for everyone. But not just anyone.

learn more
Auth0 gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity and extensibility to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.

Read more about Auth0

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. With our Zero Trust approach, user access is segmented based on identity and context, significantly reducing the attack surface.

Read more about Perimeter 81

Users also considered
Teramind logo

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Admin By Request logo

Local admin rights, managed.

learn more
Endpoint privilege management with just-in-time admin elevation, full auditing, and secure remote access for Windows, macOS, and Linux. Anti-malware file scanning, SSO and MFA enforcement, ML and AI automation, temporary local admin accounts, and a full inventory and detailed auditlog.

Read more about Admin By Request

Users also considered
OneLogin logo
Category Leaders

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
SecureLink logo

Vendor access management and remote support

learn more
SecureLink is a vendor privileged access management solution for technology enterprises and vendors which offers features such as role-based permissions, audit logs, compliance management, self registration, desktop sharing, remote support, file transfer, and more

Read more about SecureLink

Users also considered
Ivanti Connect Secure logo

SSL VPN solution for secure remote access

learn more
Ivanti Connect Secure is an SSL VPN solution for remote and mobile users. It provides access from any web-enabled device to corporate resources anytime, anywhere. Ivanti Connect Secure is a widely deployed SSL VPN for organizations of any size across every major industry, offering a single unified client for remote and on-site access, easy integration with various services, and dynamic adaptive multi-factor authentication.

Read more about Ivanti Connect Secure

Users also considered
Veriato Workforce Behavior Analytics logo

User Activity Monitoring and Insider Risk Management

learn more
At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing activity, we empower organizations to optimize their teams and mitigate risks.

Read more about Veriato Workforce Behavior Analytics

Users also considered
Passportal logo

Encrypted cloud-based, automated password protection

learn more
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities

Read more about Passportal

Users also considered
GateKeeper Enterprise logo

Shared PC authentication, proximity, 2FA/MFA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping Identity delivers intelligent identity solutions that help enterprises balance security and personalized user experiences. Leverage our best-in-class identity solutions with the 3rd party services you already use to remove passwords, prevent fraud, support Zero Trust, and anything in between.

Read more about Ping Identity

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
NordLayer logo

Cloud-based security platform for businesses

learn more
Privileged access management focuses on IT admins with unrestricted access to company data, apps and control over access roles of the rest of the organization user access management. The NordLayer solution analyzes and audits internal activities to prevent, isolate and disable any deviations.

Read more about NordLayer

Users also considered