getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Privileged Access Management Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


41 software options

ScreenConnect logo

Remote meeting platform for resolving customers' queries

visit website
ScreenConnect is a help desk solution that allows businesses to detect and resolve customer queries through remote monitoring capabilities. Agents can prevent potential cyberthreats & protect data via features such as AES-256 encryption and two-factor authentication.

Read more about ScreenConnect

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

visit website
Users and their identities can then be connected to the IT resources they need. Access can be granted and managed via JumpCloud’s web console.

Read more about JumpCloud Directory Platform

Users also considered
Okta logo

On-demand identity & access management for enterprise

visit website
Okta Privileged Access provides unified access and governance for privileged resources – whether on-prem or cloud – and increases visibility, compliance and security without compromising user experience.

Read more about Okta

Users also considered
ValidEntry logo

Free Web3.0 Identity Verification

learn more
ValidEntry enables businesses creating in Web3.0 to transform their customer identification process with AI-driven automated identity solutions.

Read more about ValidEntry

Users also considered
GateKeeper Enterprise logo

Shared PC authentication, proximity, 2FA/MFA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
GoodAccess logo

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
Rippling logo

Workforce management across HR, finance, and IT. 

learn more
Rippling is a cloud-based workforce management system that helps businesses manage operations across HR, finance, and IT.

Read more about Rippling

Users also considered
VISULOX logo

Privileged access management solution

learn more
Leading privileged access management solution with an integrated remote support platform for secure external access. VISULOX is the answer to who did what, where, and when in your IT Infrastructure.

VISULOX is easy to integrate and rapidly improves the security cloud, hybrid, or on-prem deployments

Read more about VISULOX

Users also considered
LogMeOnce logo

Password and identity management solution

learn more
LogMeOnce is a cloud-based password and identity management solution that helps businesses of all sizes manage login credentials, provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.

Read more about LogMeOnce

Users also considered
Microsoft Entra ID logo

Cloud-based identity and access management (IAM) software

learn more
Azure Active Directory, part of Microsoft Entra, is an identity and access management (IAM) software designed to help enterprises provide protection against cybersecurity attacks through single sign-on (SSO) and multi-factor authentication. It allows administrators to securely engage with internal and external stakeholders and provide on-site and remote access to various applications.

Read more about Microsoft Entra ID

Users also considered
Ping Identity logo

Experience a better experience with Ping Identity.

learn more
Ping Identity delivers intelligent identity solutions that help enterprises balance security and personalized user experiences. Leverage our best-in-class identity solutions with the 3rd party services you already use to remove passwords, prevent fraud, support Zero Trust, and anything in between.

Read more about Ping Identity

Users also considered
Bitwarden logo

The Most Trusted Open Source Password Manager for Business

learn more
Bitwarden is an open source solution that secures credentials with end-to-end encryption and manages account access.

Read more about Bitwarden

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Auth0 logo

Secure access for everyone. But not just anyone.

learn more
Auth0 gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity and extensibility to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.

Read more about Auth0

Users also considered
Cisco Duo logo

Cloud-based identity security and access management

learn more
Cisco Duo is a cloud-based identity security solution that secures access to your critical resources for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem, whether multi-cloud, hybrid, or on-premises.

Read more about Cisco Duo

Users also considered
AWS CloudTrail logo

Activity and usage monitoring tool for AWS accounts

learn more
AWS CloudTrail is a cloud-based software designed to help businesses monitor the activities of AWS accounts and manage various operational processes related to compliance, auditing, and more. Supervisors can perform security analysis and view, search or download the required event history of selected AWS accounts.

Read more about AWS CloudTrail

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
BeyondTrust Remote Support logo

Secure remote access software

learn more
BeyondTrust Remote Support enables help desk teams to quickly and securely access and fix any remote device, running any platform, located anywhere in the world through one solution.

Read more about BeyondTrust Remote Support

Users also considered
Keeper Secrets Manager logo

Infrastructure security platform

learn more
Keeper Secrets Manager is a cloud-based, fully-managed, zero-knowledge platform designed to secure sensitive infrastructure data including access keys, database passwords, API keys, certificates, and other privileged credentials.

Read more about Keeper Secrets Manager

Users also considered
ManageEngine Access Manager Plus logo

Remote Support, Privileged Access Management, Remote Work

learn more
ManageEngine Access Manager Plus is a cloud-based and on-premise solution that helps IT administrators manage privileged access and secure remote sessions.

Read more about ManageEngine Access Manager Plus

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

learn more
ADManager Plus enhances PAM by streamlining Active Directory, M365, and Google Workspace control. It uses detailed reporting and risk assessment, and risk exposure management (with visual attack paths to privileged entities) to identify high-risk access, supporting secure delegation and compliance.

Read more about ManageEngine ADManager Plus

Users also considered
miniOrange logo

One solution for billions of Identity & Access needs.

learn more
miniOrange is a identity and access management (IAM) provider for businesses to make any IAM feature applicable such as SSO, MFA, Provisioning, Brokering, etc. on any application across the internet.

Read more about miniOrange

Users also considered
Ivanti Connect Secure logo

SSL VPN solution for secure remote access

learn more
Ivanti Connect Secure is an SSL VPN solution for remote and mobile users. It provides access from any web-enabled device to corporate resources anytime, anywhere. Ivanti Connect Secure is a widely deployed SSL VPN for organizations of any size across every major industry, offering a single unified client for remote and on-site access, easy integration with various services, and dynamic adaptive multi-factor authentication.

Read more about Ivanti Connect Secure

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered
Amazon Cognito logo

User authentication and access management software

learn more
Amazon Cognito is an authentication management software designed to help businesses manage user sign-up, sign-in, and access to mobile and web applications via a unified portal. The platform enables users to sign in using enterprise identity providers like OpenID Connect, and SAML 2.0 and various social identity providers such as Amazon, Apple, Google, and Facebook.

Read more about Amazon Cognito

Users also considered