App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Privileged Access Management Software - Page 3

88 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Keeper Secrets Manager logo

Keeper Secrets Manager

4.5
(2)

Infrastructure security platform

learn more
Keeper Secrets Manager is a cloud-based, fully-managed, zero-knowledge platform designed to secure sensitive infrastructure data including access keys, database passwords, API keys, certificates, and other privileged credentials.

Read more about Keeper Secrets Manager

Users also considered
Amazon Cognito logo

Amazon Cognito

4.0
(2)

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered
Oz Liveness logo

Oz Liveness

5.0
(1)

Facial recognition tool for mitigating biometric fraud

learn more
Oz Liveness is a facial recognition tool, which helps organizations mitigate the risk of biometric fraud by preventing deepfake and spoofing attacks using advanced algorithms

Read more about Oz Liveness

Users also considered
Soffid IAM logo

Soffid IAM

5.0
(1)

The Future of IAM is here and it's converged

learn more
Soffid IAM is a Converged IAM Platform that brings Access Management (AM), Identity Governance (IGA) and Privileged Account Management (PAM) in one comprehensive platform. Soffid enables fast and accurate user provisioning, role-based access management, reporting and analytics.

Read more about Soffid IAM

Users also considered
SecureONE logo

SecureONE

5.0
(1)

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Hitachi ID Bravura Privilege logo

Hitachi ID Bravura Privilege

4.0
(1)

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Hitachi ID Bravura Privilege

Users also considered
BioSig-ID logo

BioSig-ID

2.3
(3)

Authentication and password management tool using biometrics

learn more
BioSig-ID is an authentication software designed to help businesses identify users by capturing their movements or gestures while drawing a password using their finger or mouse. It enables organizations to protect digital content or assets using gesture biometric passwords and provide multi-factor authentication to users.

Read more about BioSig-ID

Users also considered
Fastpath Assure logo

Fastpath Assure

(0)

Compliance, GRC, audit, and privileged access management

learn more
Fastpath Assure is a governance, risk, and compliance (GRC) suite that enables businesses to streamline security and auditing operations. Users can analyze and report on segregated duties, transactions, and security access, ensuring visibility across activities and eliminating role conflicts.

Read more about Fastpath Assure

Users also considered
C CURE 9000 logo

C CURE 9000

(0)

Security, event & privileged access management software

learn more
C•CURE 9000 is a security and event management software that provides businesses with physical security for employees, buildings, and assets through video surveillance and access control capabilities. Authorized users can manage employees and clearance processes and monitor alarm systems or events.

Read more about C CURE 9000

Users also considered
Akku (Cloud Access Security Broker) logo

Akku (Cloud Access Security Broker)

(0)

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
CipherTrust Data Security Platform logo

CipherTrust Data Security Platform

(0)

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
Jamf Private Access logo

Jamf Private Access

(0)

Network access management software

learn more
Jamf Private Access provides users secure ZTNA access to corporate resources.

Read more about Jamf Private Access

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
Clear Skye IGA logo

Clear Skye IGA

(0)

ServiceNow-powered identity governance and administration

learn more
Built on ServiceNow, Clear Skye IGA is an identity governance and administration solution that streamlines access requests and reviews across the enterprise with flexible workflow automation.

Read more about Clear Skye IGA

Users also considered
Efecte IAM logo

Efecte IAM

(0)

The European option for Identity and Access Management

learn more
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM. Efecte IAM is a proven solution that helps organizations of all sizes improve their IAM processes, governance, and security.

Read more about Efecte IAM

Users also considered
M365 Manager Plus logo

M365 Manager Plus

(0)

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
strongDM logo

strongDM

(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Privileged Account Manager logo

Privileged Account Manager

(0)

Access Governance redefined for Hybrid environments

learn more
Securden Unified PAM is a browser-based privileged access management solution that can be deployed on-premise and on private cloud environments. Granular access management to IT assets, one-click secure remote access, and user onboarding and provisioning are all made easier.

Read more about Privileged Account Manager

Users also considered
Ignimission Protec logo

Ignimission Protec

(0)

Speed up PAM project deployment, and increase user adoption

learn more
Ignimission Protec facilitates the federation of data related to PAM applications and gives teams more visibility regardless of the number of accounts.

Read more about Ignimission Protec

Users also considered
Privileged Remote Access logo

Privileged Remote Access

(0)

Web-based identity management and access control software

learn more
Privileged Remote Access enables firms to gain situational awareness, visibility, and operational transparency over employee and third-party vendor access protocols. Key attributes include access control, session monitoring, risk detection, audit control, and password management.

Read more about Privileged Remote Access

Users also considered
ZertID PAM logo

ZertID PAM

(0)

Privileged access and identity management solution

learn more
ZertID PAM extends the native ZertID IAM and IGA product capabilities to offer enhanced Privileged Account Security.

Read more about ZertID PAM

Users also considered
EmpowerID logo

EmpowerID

(0)

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Securden logo

Securden

(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
Adapt logo

Adapt

(0)

Frictionless logins: when the credentials and user match.

learn more
ADAPT is a standards-based login MFA platform that provides added login security without additional devices. It uses behavioral biometrics and other ambient signals to authenticate users at the point of login.

Read more about Adapt

Users also considered
IDEE logo

IDEE

(0)

Cloud-based passwordless authentication software

learn more
IDEE is cloud-based authentication software designed to help businesses manage digital identities without passwords. Customers can only log in or out using their smartphones. The application creates an identity bond between the customer and the company without passwords or databases.

Read more about IDEE

Users also considered