App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software - Page 4

Last updated: Oct 3rd 2024

Filter results




Pricing model




User rating


125 software options

Sponsored

Privileged Remote Access logo

Web-based identity management and access control software

learn more
Privileged Remote Access enables firms to gain situational awareness, visibility, and operational transparency over employee and third-party vendor access protocols. Key attributes include access control, session monitoring, risk detection, audit control, and password management.

Read more about Privileged Remote Access

Users also considered
Carbon Black App Control logo

Endpoint protection and network access management software

learn more
Carbon Black App Control is a endpoint protection software that helps businesses track compliance, set up device control, ensure malware protection, and manage other operations. It allows staff members to combine file integrity monitoring, device control, memory protection, application control, and tamper protection on a centralized platform.

Read more about Carbon Black App Control

Users also considered
Bravura Privilege logo

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Bravura Privilege

Users also considered
BioSig-ID logo

Authentication and password management tool using biometrics

learn more
BioSig-ID is an authentication software designed to help businesses identify users by capturing their movements or gestures while drawing a password using their finger or mouse. It enables organizations to protect digital content or assets using gesture biometric passwords and provide multi-factor authentication to users.

Read more about BioSig-ID

Users also considered
Symantec PAM logo

Privileged access management (PAM) platform

learn more
Symantec PAM is a privileged access management (PAM) platform that helps businesses control access to devices and data. Teams can remove hard-coded passwords from applications, configuration files, and scripts to enable secure communications.

Read more about Symantec PAM

Users also considered
Fastpath Assure logo

Compliance, GRC, audit, and privileged access management

learn more
Fastpath Assure is a governance, risk, and compliance (GRC) suite that enables businesses to streamline security and auditing operations. Users can analyze and report on segregated duties, transactions, and security access, ensuring visibility across activities and eliminating role conflicts.

Read more about Fastpath Assure

Users also considered
C CURE 9000 logo

Security, event & privileged access management software

learn more
C•CURE 9000 is a security and event management software that provides businesses with physical security for employees, buildings, and assets through video surveillance and access control capabilities. Authorized users can manage employees and clearance processes and monitor alarm systems or events.

Read more about C CURE 9000

Users also considered
Akku (Cloud Access Security Broker) logo

Cloud-based identity and access manegement (IAM) tool

learn more
Akku is a cloud-based identity and access management (IAM) software that provides businesses with tools to secure confidential information and manage access to enterprise data. Supervisors can facilitate and streamline employees’ access to multiple applications through single sign-on (SSO) capabilities.

Read more about Akku (Cloud Access Security Broker)

Users also considered
Appaegis Isolation Access Cloud logo

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
CipherTrust Data Security Platform logo

Data security solution

learn more
CipherTrust Data Security Platform is a comprehensive data security solution that is deployed in the cloud. It provides protection for sensitive data and software and offers a variety of features that can be tailored to the specific needs of businesses.

Read more about CipherTrust Data Security Platform

Users also considered
BigID.me logo

Data privacy management platform

learn more
BigID.me is a data privacy management platform that helps businesses ensure compliance with various privacy regulations. It offers a dashboard for users to track, manage, and fulfill privacy requests.

Read more about BigID.me

Users also considered
Unified PAM MSP logo

Privileged access management solution for MSPs

learn more
Securden Unified PAM MSP is a privileged access management solution tailored specifically for IT service providers. The solution is the result of extensive collaboration with top MSPs, addressing their most pressing challenges head-on.

Read more about Unified PAM MSP

Users also considered
RoboShadow logo

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
Millennium Ultra logo

Priviledged access management

learn more
Millennium Ultra is a priviledged access management software that helps businesses configure access controls for staff members and remotely monitor ongoing operations. The operator mobile app allows supervisors to authorize credentials, issue and revoke credentials, and receive verification emails.

Read more about Millennium Ultra

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
Clear Skye IGA logo

ServiceNow-powered identity governance and administration

learn more
Built on ServiceNow, Clear Skye IGA is an identity governance and administration solution that streamlines access requests and reviews across the enterprise with flexible workflow automation.

Read more about Clear Skye IGA

Users also considered
Ignimission Protec logo

Speed up PAM project deployment, and increase user adoption

learn more
Ignimission Protec facilitates the federation of data related to PAM applications and gives teams more visibility regardless of the number of accounts.

Read more about Ignimission Protec

Users also considered
M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
Privileged Account Manager logo

Access Governance redefined for Hybrid environments

learn more
Discover credentials and manage them centrally. Control privileged activity, keep an eye on it, and record sessions. Mitigate the dangers of privileged access. Implement on-premises or host on private cloud instances.

Read more about Privileged Account Manager

Users also considered
ZertID PAM logo

Privileged access and identity management solution

learn more
ZertID PAM extends the native ZertID IAM and IGA product capabilities to offer enhanced Privileged Account Security.

Read more about ZertID PAM

Users also considered
Jira Oauth logo

Enable Secure Login to Jira Cloud through mO Jira OAuth

learn more
The Jira OAuth solution makes it easy for users to log in to Jira with their OAuth 2.0 credentials and OpenID Connect credentials.

Integrate your custom OAuth Provider with Atlassian Access to ensure seamless SSO.

Read more about Jira Oauth

Users also considered
Nano ASP.NET Boilerplate logo

Privileged access management software

learn more
Nano ASP.NET Boilerplate is a privileged access management software that helps businesses utilize a multi-tenant architecture to streamline SaaS development. The platform enables managers to build custom business logic and application services using a sample entity with CRUD service and controller, generic repository, specification pattern, and automated entity to DTO mappings with Automapper.

Read more about Nano ASP.NET Boilerplate

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
IDEE logo

Cloud-based passwordless authentication software

learn more
IDEE is cloud-based authentication software designed to help businesses manage digital identities without passwords. Customers can only log in or out using their smartphones. The application creates an identity bond between the customer and the company without passwords or databases.

Read more about IDEE

Users also considered