Privileged Access Management
Privileged Access Management solutions for securing privileged accounts, managing admin access, and monitoring high-risk user activities.
Browse 134 privileged access management tools
FEATURED
- Home
- Categories
- IAM
- Privileged Access Management
RELATED TASKS
Identity-first security platform with PAM, ZTNA, and ITDR capabilities
Identity-first security platform with PAM, ZTNA, and ITDR capabilities
PAM and user activity monitoring platform for insider risk management.
PAM and user activity monitoring platform for insider risk management.
PAM & secrets mgmt suite with JIT access, SSH key mgmt & ZSP.
PAM & secrets mgmt suite with JIT access, SSH key mgmt & ZSP.
Manages SSH access via short-lived certificates tied to identity providers.
Manages SSH access via short-lived certificates tied to identity providers.
Replaces static SSH keys with short-lived certificates tied to SSO & device identity.
Replaces static SSH keys with short-lived certificates tied to SSO & device identity.
MPC-based platform for threshold cryptography & privacy-preserving computation.
MPC-based platform for threshold cryptography & privacy-preserving computation.
PAM solution for privileged access discovery and just-in-time access control.
PAM solution for privileged access discovery and just-in-time access control.
Centralized access control & PAM platform for enterprise infrastructure.
Centralized access control & PAM platform for enterprise infrastructure.
AD privileged access assessment tool using effective permissions analysis.
AD privileged access assessment tool using effective permissions analysis.
Calculates effective permissions on AD objects to audit privileged access.
Calculates effective permissions on AD objects to audit privileged access.
Assesses privileged access in Active Directory via effective permissions analysis.
Assesses privileged access in Active Directory via effective permissions analysis.
Audits effective access & permissions on Active Directory objects.
Audits effective access & permissions on Active Directory objects.
JIT, least-privilege access control and audit trails for AI agents.
JIT, least-privilege access control and audit trails for AI agents.
JIT privileged access management for human, NHI, and AI identities.
JIT privileged access management for human, NHI, and AI identities.
PAM platform replacing standing access with JIT, least-privilege controls.
PAM platform replacing standing access with JIT, least-privilege controls.
PAM vendor acquired by SailPoint; products no longer for sale.
PAM vendor acquired by SailPoint; products no longer for sale.
Cloud-native PAM platform for securing and monitoring privileged accounts.
Cloud-native PAM platform for securing and monitoring privileged accounts.
Endpoint privilege mgmt enforcing least privilege & ITDR for fed agencies.
Endpoint privilege mgmt enforcing least privilege & ITDR for fed agencies.
JIT access platform issuing ephemeral certs to eliminate standing privileges.
JIT access platform issuing ephemeral certs to eliminate standing privileges.
Open-source cross-platform SSH agent for managing private keys & auth.
Open-source cross-platform SSH agent for managing private keys & auth.
PAM platform securing privileged accounts across endpoints, servers & cloud.
PAM platform securing privileged accounts across endpoints, servers & cloud.
NIAP PP4.0-certified hardware KM switches for secure multi-computer control.
NIAP PP4.0-certified hardware KM switches for secure multi-computer control.
NIAP PP4.0-certified KM switch for secure peripheral sharing across 4 PCs.
NIAP PP4.0-certified KM switch for secure peripheral sharing across 4 PCs.
z/OS mainframe cybersecurity software, IAM, compliance & audit tools.
z/OS mainframe cybersecurity software, IAM, compliance & audit tools.
Privileged Access Management Tools - FAQ
Common questions about Privileged Access Management tools including selection guides, pricing, and comparisons.
Privileged Access Management solutions for securing privileged accounts, managing admin access, and monitoring high-risk user activities.