top of page
  • Mweemba Simuyi

Privileged Access Management Solutions Reviews & Ratings

Updated: Dec 5, 2022



What are PAM Solutions?


A privileged access management (PAM) tool is used to mitigate the risk of privileged access. In other words, accounts, credentials and operations that offer an elevated (or “privileged”) level of access. PAM tools are used by machines (software) and by people who administer or configure IT Infrastructure. A PAM solution can be deployed as on-premises software, SaaS or a hardware appliance. The core capabilities of PAM include: Discovery of privileged accounts across multiple systems, infrastructure and applications; Credential management for privileged accounts; Credential vaulting and control of access to privileged accounts; Session establishment, management, monitoring and recording for interactive privileged access. Here are some of the top solutions reviewed by customers :


SECRET SERVER

BY DELINEA





Secret Server Overview



What is Delinea Secret Server?


Secret Server (originally from Thycotic, now from Delinea since the 2021 Thycotic merger with Centrify) is an enterprise password management application, which is available with either a cloud-based or on-premise deployment which emphasizes fast deployment, scalability, and simplicity.


The software gives security and IT ops teams the agility to secure and manage all types of privileges, protecting administrator, service, application, and root accounts from cyber attack. Store privileged credentials in an encrypted, centralized vault.


The vendor states that unlike traditional, complex PAM solutions, Secret Server works the way users work, starting with a rapid deployment and giving users direct control to customize as they grow. Secret Server aims to enable organizations to:

Improve Security Posture: Protecting privileged accounts helps businesses tighten their attack surface and build resilience against other causes of disruption.


Minimize Complexity & Maintain Productivity - Secret Server is presented as fast to deploy and easy to use, unburdening IT teams.


Experience Enterprise-Class Performance - According to the vendor, Delinea secures privileged accounts for more than 10,000 organiz


ations worldwide, including Fortune 500 enterprises and is deployed on the largest networks in the world. Delinea Secret Server Features


  • Secure Vault and Password Manager with AD Integration

  • Discover Local and Active Directory Privileged Accounts

  • Automatic Password Changing for Network Accounts

  • Enhanced Auditing & Reporting

  • Service Account and Dependency Management




Secret Server is a PAM solution available both on-premise and in the cloud. As cyber threats increase, effective and agile privileged access management, or PAM, has become mission-critical. Secret Server empowers security and IT Teams to secure and manage all types of privileged accounts. This short video shows some of the highlights of Secret Server.


Delinea Secret Server Technical Details

Deployment Types

On-premise, Software as a Service (SaaS), Cloud, or Web-Based

Operating Systems

Windows, Linux, Red Hat Enterprise Linux

Mobile Applications

Apple iOS, Android, Windows Phone, Blackberry, Mobile Web

Customer Reviews

"Master And Amazingly Designed PAM Platform"

4.5

Overall User Rating


Overall Comment:"Thycotic Secret Server deserves high regard because it is able to protect our company from all current and future cyber-attacks that use privileged accounts to target the core of our business. Database mirroring, high-availability disaster recovery capabilities, hot backups, and a unique limitless admin mode, for "break-the-glass" scenarios, are all available in a single package of Thycotic Secret Server solutions. Security rules are easily met with out-of-the-box and bespoke reports. Thycotic Secret Server takes a different approach to security than the typical convoluted, disjointed approach."


Lessons Learned

What do you like most about the product or service? I discovered numerous features that set it apart from the competition, such as its high scalability, constant availability, easy customization, faster, easier, and more inexpensive solution that simply safeguards us. I like it because with this we enjoyed a fully secure environment in our organization. It offers zero-trust policies for remote workers and third-party/vendor access. Thycotic Database Access Controller is its best tool, and it appeals to me the most because it allows us to restrict web access to our database to protect our company's most critical data. It has allowed us to remove local administrator access and implement the least privilege on endpoints and as a result, we were able to prevent malware and current security threats from exploiting apps.


What do you dislike most about the product or service? Presently, two-factor authentication depends on third-party services that require a membership. It would be good if they could also provide two-factor authentication services bundled with other features. Because Thycotic Secret Server is currently used by our several teams, special consideration must be made to how data will be shared and managed.


Please explain the business problems or needs that prompted the purchase of this product or service. We compared it to other PAM solutions when looking for a cost-effective and reliable solution, and we found it to be the most affordable, uncomplicated to use, acquire, deploy, and own. It's simple to modify, we can customize it on our own by taking care of our needs without spending our time or money on costly experts. Every business requires a quick tool, regardless of why it is going to be implemented. Thycotic Secret Server is the fastest solution out there that manages credentials for apps, databases, continuous integration, and delivery services and tools without generating delays in the development process.

If you could start over, what would your organization do differently? Thycotic Secret Server detects unusual privileged account behavior in real-time and as a result allows us to respond before a cyber danger turns into a cyber disaster and takes us to sensitive data leakage, reputation, and financial losses.

What one piece of advice would you give other prospective customers? Since implementing this, not only have we witnessed a reduction in security issues in our organization, but it has also freed our IT help desk personnel from time-consuming, unproductive tasks. Well, Thycotic Secret Server is recommended to all but it is the ideal PAM solution for those who want granular control and visibility into their environment while having a faster and affordable privileged access management solution. It offers fine-grained control over web apps and a cloud management solution that runs on the web.


Evaluation

Why did you purchase this product or service?

  • Enhance decision making

  • Reduce time to market

What were the key factors that drove your decision?

  • Product functionality and performance

  • Strong customer focus

  • Ease of deployment, administration, and maintenance.



CYBERARK PRIVILEGED ACCESS MANAGEMENT SOLUTIONS


CyberArk PAM Overview


What is CyberArk Privileged Access Management solutions?


CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets.


CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats.


CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well.


CyberArk Privileged Access Management Features


  • Manage Privileged Credentials

  • Isolate & Monitor Sessions

  • Threat Detection & Response

  • Manage Nomadic Devices

  • Remote Access to PAM

  • Adaptive MFA & SSO


CyberArk PAM Technical Details

Deployment Types

On-premise, Software as a Service (SaaS), Cloud, or Web-Based

Operating Systems

Windows, Linux

Mobile Applications

Apple iOS, Android, Mobile Web

Customer Reviews

"UI of CyberArk Privileged Access Manager has been simplified and unified"

4.0

Overall User Rating


Overall Comment:"CyberArk Privileged Access Manager is a next-generation solution that fosters us to secure both our applications and sensitive programs. I really like CyberArk because it is extremely adaptable and can be used in a variety of settings. CyberArk provides a fully cloud-based, hybrid, or on-premises environment; we can now protect and access our critical infrastructure in any way that best suits their needs. The user interface of CyberArk Privileged Access Manager has been simplified and unified although we can manage the solution from a single location. The UI enables us to view and manage all of the information and controls that administrators require easy access to. CyberArk manages and assigns security credentials around the globe. We can now access and use all of their system's critical information and controls from a single location."


Lessons Learned

What do you like most about the product or service? I love the ability to manage the program from a single centralized user interface and the user interface of CyberArk Privileged Access Manager contains all of the system controls and information that we need. I also like the ability to automate tasks that can save valuable time by delegating certain management tasks to the system. We can now reserve their time for the most important tasks and it also enables the system to simplify management by having the platform perform the most complex functions. Our work has been replaced by automated password management and the CyberArk controls also enable our organization to manage the risks associated with elevated privileges. CyberArk offers a high return on investment; CyberArk greatly assists us in maintaining control over the use of NPAs. This, in turn, translates into an appropriate risk score for the organization, which directly saves actual money.


What do you dislike most about the product or service? It's certainly pricey however when it comes to privileged access management, CyberArk is the market leader. I know we pay a lot, but we are paying for the value that is provided. The capacity of CyberArk is a major issue for us due to the sheer volume of NPAs that we manage. We're a large company with hundreds of thousands of non-personal accounts to manage. Furthermore, we've already discovered that there are some capacity constraints within CyberArk that could cause performance issues. From my perspective, it would be beneficial if the vault could store more passwords and be more scalable.


Please explain the business problems or needs that prompted the purchase of this product or service. CyberArk offers a unified and automated approach to securing access across environments. We want to provide a unified way for all environments to be accessed therefore I chose this product. Also, it has a simple UI that contains everything we desire.

If you could start over, what would your organization do differently? We have options for safeguarding various types of identities and it also serves as a medium for authenticating our systems, not just with passwords but also with PKI certificates and RSA Tokens. As a result, there are numerous options for accomplishing this. It has a wide range of capabilities for managing all security identities that keeps us secured and profitable.

What one piece of advice would you give other prospective customers? CyberArk can manage user IDs and permissions in a cloud environment. CyberArk Privileged Access Manager is a very useful tool in a world where being able to work remotely is becoming increasingly important. When our administrators are away from the office, they do not need to be concerned about infrastructure security.


Evaluation


Why did you purchase this product or service?

  • Improve business process agility

  • Improve compliance & risk management


What were the key factors that drove your decision?

  • Product functionality and performance


Which other vendors did you consider in your evaluation?

  • Delinea


Note : The reviews featured are from customers of the products stated and are by no means associated with Next Solutions Limited.

9 views0 comments
bottom of page