Alternatives to Securden Unified PAM

Compare Securden Unified PAM alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Securden Unified PAM in 2026. Compare features, ratings, user reviews, pricing, and more from Securden Unified PAM competitors and alternatives in order to make an informed decision for your business.

  • 1
    Passwork

    Passwork

    Passwork

    Passwork is an on-premise corporate password manager built for security-conscious organizations. Developed and headquartered in Europe (Barcelona, Spain), Passwork meets GDPR, NIS2, ENS and other European regulatory requirements by design. All passwords and credentials are stored exclusively on your own server. Double-layer AES-256 encryption (server-side and client-side) with zero-knowledge architecture means your data stays within your infrastructure, fully under the control of your system administrators. Passwork is ISO/IEC 27001 certified. Your data never leaves your infrastructure. Trusted by enterprises for secure password sharing, privileged access management, & centralized credential governance.
    Leader badge
    Partner badge
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    ThreatLocker is a Zero Trust Platform that prevents cyber threats by blocking unknown applications, enforcing least privilege, and controlling what can run across your environment. Using Allowlisting, Ringfencing, Network Control, and more, ThreatLocker stops ransomware, zero-day attacks, and unauthorized activity before execution, rather than relying on detection after the fact. Built for modern IT and cybersecurity teams, the platform delivers centralized visibility and policy management across endpoints, users, and applications. ThreatLocker reduces attack surface, limits lateral movement, and supports compliance with detailed audit logs. With fast deployment, a large built-in application library, and streamlined approvals, organizations can strengthen security while minimizing operational overhead and maintaining business continuity.
    Leader badge
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 3
    Admin By Request Endpoint Privilege Management
    Admin By Request’s Endpoint Privilege Management gives organisations full control over local admin rights, application elevation, and endpoint privilege access across Windows, macOS, and Linux, without the complexity of traditional PAM solutions. For mid-market organisations, EPM acts as a complete, easy-to-deploy solution for managing endpoint access and privilege. It removes standing admin rights, enables just-in-time elevation, supports approval workflows, and provides full audit trails to strengthen security and meet compliance requirements. For enterprise organisations, EPM fits alongside existing security and identity stacks as a focused control layer that closes endpoint gaps traditional PAM solutions often leave behind, improving control without increasing support costs or requiring a full PAM overhaul.
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 4
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
    Leader badge
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 5
    Securden Endpoint Privilege Manager
    Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. Capabilities include JIT local admin rights, application usage tracking, and local administrator group monitoring. Secure remote access supports IT helpdesk operations, while built-in controls help meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture and wide array of integrations make Securden EPM ideal for securing enterprise endpoints at scale.
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 6
    Uniqkey

    Uniqkey

    Uniqkey

    Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control. Engineered by European cybersecurity experts, our platform combines military-grade encryption with an effortless user experience. We remove complexity from everyday workflows, helping employees stay secure without slowing them down. From auto-filling 2FA codes to streamlining access across your cloud environment, Uniqkey keeps security frictionless and productivity high. With real-time visibility across your entire infrastructure, IT teams gain complete control over access rights, employee activity, and security scores - empowering them to defend against threats and drive compliance with confidence proactively. Seamlessly integrated with Microsoft and other core systems, Uniqkey makes provisioning and offboarding fast, automated, and secure.
    Compare vs. Securden Unified PAM View Software
    Visit Website
  • 7
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 8
    Foxpass

    Foxpass

    Foxpass

    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
  • 9
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 10
    ARCON | Endpoint Privilege Management
    The ARCON | Endpoint Privilege Management solution (EPM) grants endpoint privileges ‘just-in-time’ or ‘on-demand’ and monitors all end users for you. The tool detects insider threats, compromised identities, and other malicious attempts to breach endpoints. It has a powerful User behavior Analytics component that takes note of the normal conduct of end users and identifies atypical behavior profiles and other entities in the network. A single governance framework enables you to blacklist malicious applications, prevent data being copied from devices to removable storage, and offers fine-grained access to all applications with ‘just-in-time’ privilege elevation and demotion capabilities. No matter how many endpoints you have because of WFH and remote access workplaces, secure them all with a single endpoint management tool. Elevate privileges according to your discretion, at your convenience.
  • 11
    BeyondTrust Endpoint Privilege Management
    Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.
  • 12
    CyberArk Endpoint Privilege Manager
    Your security must be as nimble as you are. Endpoint Privilege Manager can adjust in real time to give users on-demand local admin access whenever they need it. Attackers work hard to find your vulnerabilities. We work harder, by automatically blocking credential theft before it can do damage. There are millions of ransomware variations out there today. Our solution is proven to prevent 100% of ransomware attacks. Temporarily elevate end-user privileges for specific tasks, on-demand, in real-time, with minimal help desk involvement. Stop ransomware before it stops you. Take control of local admin accounts without disrupting workflow. Work anywhere on any device—while securing your assets and your reputation. Secure every device without disrupting everyday operations.
  • 13
    Vault One

    Vault One

    VaultOne Software

    Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4
    Starting Price: $99 per month
  • 14
    SecureKi

    SecureKi

    SecureKi

    Secure access for your business, customers, or employees with our unparalleled identity security backed by a zero–trust philosophy. When it comes to protecting your data, passwords are the weakest link. That is why multifactor authentication has become the identity and access management standard for preventing unauthorized access. Verify the identity of all users with SecureKi. Compromised access and credentials most often are the leading attack vectors of a security breach. Our comprehensive privileged access management is designed to manage and monitor privileged access to accounts and applications, alert system administrators on high-risk events, reduce operations complexity, and meet regulatory compliance with ease. Privilege escalation is at the core of most cyber-attacks and system vulnerabilities.
  • 15
    Core Privileged Access Manager (BoKS)
    Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
  • 16
    Delinea Privilege Manager
    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors.
  • 17
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 18
    BeyondTrust Pathfinder
    BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
  • 19
    Passly

    Passly

    IDAgent

    Growing numbers of remote workers, increased dependency on cloud applications, and explosive increases in cyber theft should require every organization of every size to consider Secure Identity & Access Management. With Passly™ from ID Agent (a Kaseya company), IT teams can easily, simply, and affordably enable the right people to have the right access to the right resources – all from the right devices and locations. Secure Password Management, Single Sign-On, Multi-Factor Authentication and more. In a time when the threat of cyberattack has never been greater, and with nearly 80% percent of all data breaches due to lost, weak or stolen passwords, it’s critical to select the right secure identity & access management platform. Passly provides the most comprehensive and cost-effective solution to enable security, compliance, and efficiency. Shared Password Vaults allow techs to manage and store passwords for business, personal or shared accounts. Centralized and easy to use.
  • 20
    ManageEngine Application Control Plus
    Application Control Plus is an enterprise solution that leverages application control and privilege management features to fortify endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all untrusted applications out of your network. Protect your risky legacy OS machines by deploying application control policies that prevent vulnerable applications without a patch from running. Augment the security of customer-facing systems such as point-of-sale or fixed-function machines by simulating an environment under lockdown using policies run in Strict Mode.
  • 21
    CyberFOX AutoElevate
    AutoElevate is a privileged access management solution designed specifically for MSPs and IT professionals. It helps organizations remove unnecessary admin rights while maintaining productivity and operational efficiency. The platform enables secure privilege elevation, ensuring users receive access only when it’s needed. AutoElevate integrates seamlessly into existing IT environments without disrupting workflows. It centralizes privilege management into a single, easy-to-use interface. By controlling access to critical systems, it reduces the risk of security breaches caused by overprivileged accounts. AutoElevate allows IT teams to secure endpoints while keeping users productive.
  • 22
    Delinea Secret Server
    Protect your privileged accounts with our enterprise-grade Privileged Access Management (PAM) solution. Available both on-premise or in the cloud. Get up and running fast with solutions for privileged account discovery, turnkey installation and out-of-the-box auditing and reporting tools. Manage multiple databases, software applications, hypervisors, network devices, and security tools, even in large-scale, distributed environments. Create endless customizations with direct control to on-premise and cloud PAM. Work with professional services or use your own experts. Secure privileges for service, application, root, and administrator accounts across your enterprise. Store privileged credentials in an encrypted, centralized vault. Identify all service, application, administrator, and root accounts to curb sprawl and gain a full view of your privileged access. Provision and deprovision, ensure password complexity and rotate credentials.
  • 23
    Segura

    Segura

    Segura

    Segura® (formerly senhasegura) is a cybersecurity company focused on Privileged Access Management (PAM). Its platform helps organizations secure and manage privileged identities, credentials, and secrets across hybrid and cloud environments. Segura supports use cases such as credential vaulting, session monitoring, privilege elevation, and secrets management for DevOps. Designed to simplify complex identity security challenges, Segura provides IT teams with visibility, control, and tools to reduce risk and support compliance. The company operates globally through a network of partners and serves customers across key sectors, including finance, healthcare, government, telecom, and critical infrastructure.
  • 24
    Evo Security

    Evo Security

    Evo Security

    Eliminate credential sharing, establish powerful administrative permissions, mass deploy login security for your customers, and meet insurance and compliance requirements with Evo Security. EPIC is the next evolutionary step for MSPs, MSSPs, NOCs, and SOCs seeking to reduce credential sharing risk and secure logins for endpoints, network devices, and web applications all-in-one. The big secret about managed services is that MSP administrators are forced to share customer passwords and MFA codes internally. Password Managers and other Password Rotation tools offer sharing convenience with some iterative improvements, however ultimately propagate the same problem. With cybercriminals targeting MSPs more than ever, and regulation mandates demanding a better way, this involuntary poor practice has run its course. Easily accommodate managed or co-managed Customer scenarios when technicians and administrators need access to the Evo platform using the Evo Privileged Access Manager.
  • 25
    ManageEngine Password Manager Pro
    Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include: Eliminating password fatigue and security lapses by deploying a secure, centralized vault for password storage and access. Improving IT productivity many times by automating frequent password changes required in critical systems. Providing preventive & detective security controls through approval workflows & real-time alerts on password access. Meeting security audits and regulatory compliance such as SOX, HIPAA and PCI. Video record & audit all privileged access, and get a complete record of all actions. Control access to IT resources and applications based on roles and job responsibilities. Launch direct connection to remote IT resources, websites and applications.
  • 26
    Securden Unified PAM MSP
    To enforce complete access governance, MSPs purchase multiple solutions at a premium. We have combined all the required modules into one unified solution that solves the most crucial challenges faced by managed IT service providers. In addition to deploying robust access controls, MSPs can generate recurring revenue streams by providing privileged access management as a service. Grant JIT-based remote access to third parties and employees. Track and record all activities for complete control. Reduce the attack surface by eliminating external and internal threats. Automate privileged access provisioning to reduce helpdesk load and eliminate unnecessary downtime. Deploy robust privileged access workflows and realize an increase in efficiency instantly.
  • 27
    Ivanti Application Control
    Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system​.
  • 28
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 29
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 30
    Kelltron IAM Suite
    Kelltron’s IAM Suite is an AI-powered identity security platform that unifies Identity & Access Management (IAM), Privileged Access Management (PAM), and Data Governance (DGM) into one seamless solution. It enables secure user provisioning, Single Sign-On (SSO) to 4,000+ apps, adaptive Multi-Factor Authentication (MFA), and role-based access control. PAM features include just-in-time access, session monitoring, and credential vaulting to safeguard privileged accounts. The DGM module helps discover, classify, and enforce data access policies for compliance with GDPR, ISO 27001, and more. Designed for hybrid IT environments, Kelltron offers cloud, on-prem, and multi-tenant deployment. AI-driven automation reduces manual workload by flagging anomalies, suggesting least-privilege access, and generating real-time risk insights. With 24/7 support and a 6-month free trial, Kelltron empowers businesses and MSPs to scale securely with full visibility and control.
  • 31
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 32
    Topicus KeyHub
    Topicus KeyHub offers Privileged Access Management for people. Gain easy and secure access to containers, sensitive data and production environments with privileged access management. KeyHub provides just-in-time access and enforces least privilege principles.
  • 33
    Bravura Privilege

    Bravura Privilege

    Bravura Security

    Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Bravura Privilege secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster. Bravura Privilege grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premises or in the cloud. Discovers and classifies privileged accounts and security groups. Randomizes passwords and stores them in an encrypted, replicated vault.
  • 34
    Defakto

    Defakto

    Defakto

    Defakto secures every automated interaction by issuing short-lived, verifiable identities to non-human actors such as services, pipelines, AI agents, and machines, eliminating static credentials, API keys, and standing privileges. Their unified non-human identity and access management solution enables discovery of unmanaged identities across cloud, on-premises, and hybrid environments, issu­ance of dynamic identities at runtime tied to policy, enforcement of least-privilege access, and full audit-ready logging. The product consists of modules; Ledger for continuous discovery and governance of non-human identities; Mint for automated issuance of purpose-bound, ephemeral identities; Ship for secretless CI/CD workflows where hard-coded credentials are removed; Trim for automatic right-sizing of access and removal of over-privileged service accounts; and Mind for securing AI agents and large-language models with the same identity model used for workloads.
  • 35
    IBM Verify Privilege
    You trust your privileged users with elevated access to critical systems, data, and functions. However, their advanced entitlements need to be vetted, monitored, and analyzed to protect your resources from cybersecurity threats and credential abuse. Research has found as much as 40% of insider cyberattacks involved privileged users. IBM Verify Privilege products, powered by Delinea, enable zero trust strategies to help minimize risk to the enterprise. Discover, control, manage, and protect privileged accounts across endpoints and hybrid multi-cloud environments. Discover unknown accounts. Reset passwords automatically. Monitor anomalous activity. Manage, protect, and audit privileged accounts across their lifecycles. Identify devices, servers, and other endpoints with administrative privileges to enforce least-privilege security, control application rights, and reduce impact on support teams.
  • 36
    ARCON | Privileged Access Management
    The ARCON | Privileged Access Management (PAM) solution provides over every aspect of your IT infrastructure so that you can build contextual security around your most important asset: data. Its granular access control allows you to structure your security infrastructure the way you want, giving and revoking access for whomever you wish, whenever you wish, all on your own terms. Get rule- and role-based access control to all target systems with the principle of ‘least-privilege’ only allowing access to data on a ‘need-to-know’ basis. This helps your admins manage, monitor, and control privileged accounts down to the individual end user. Build a unified access control and governance framework to monitor privileged identities, whether on-prem, on-cloud, in a distributed data center or a hybrid environment. Randomize and change passwords automatically to overcome the threats arising from shared credentials.
  • 37
    1Password Extended Access Management (XAM)
    1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. With its zero-trust approach, XAM helps businesses move beyond traditional identity management, strengthening security in today’s SaaS-driven workplace.
  • 38
    WALLIX BestSafe

    WALLIX BestSafe

    WALLIX Group

    Eliminate the need for user accounts with elevated permissions thanks to innovative endpoint privilege management. Achieve unparalleled security across all endpoints with permissions controlled at the application and process level – without impacting user productivity. Mitigate the risks of granting administrator privileges without overburdening your IT team. Endpoint Privilege Management applies the Principle of Least Privilege with seamless and granular application-level permissions control while empowering users to work efficiently. Block ransomware, malware, and crypto viruses from entering your network, even when users hold elevated privileges. Control privileges at the application and process-level and stop encryption operations with innovative endpoint protection technology. Enforce least privilege security efficiently, with no impact on user productivity and minimizing the need for IT intervention.
  • 39
    WALLIX Bastion
    Easy to use and deploy, the WALLIX Bastion PAM solution delivers robust security and oversight over privileged access to critical IT infrastructure. Reduce the attack surface, secure remote access, and meet regulatory compliance requirements with simplified Privileged Access Management. WALLIX Bastion delivers leading session management, secrets management, and access management features to secure IT and OT environments, enable Zero Trust and Just-In-Time policies, and to protect internal and external access to sensitive data, servers, and networks in industries ranging from healthcare to finance to industry and manufacturing. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion is available both on-premise and in cloud environments for complete flexibility, scalability, and the lowest market total cost of ownership. WALLIX Bastion PAM natively integrates with a full suite of security solutions
  • 40
    passbolt

    passbolt

    passbolt

    Finally, a password manager built for collaboration. Secure, flexible, and automation-ready. Trusted by 10,000 organizations, including Fortune 500 companies, newspapers, governments, and defense forces. Passbolt servers are designed to be simple to install and easy to manage. Yet they are enterprise-ready and can support complex setup for high availability. Passbolt can be used from your browser or mobile phone. Sharing happens in real-time. Desktop apps are coming soon. Retrieve, store and share passwords programmatically with the JSON API. Automate at scale with Passbolt CLI. Real-time access logs. Privacy is in our DNA, but also in the DNA of European laws (to make sure we don’t change our minds). Passbolt self-hosted source code comes under an AGPL license. Yes, even the commercial version. You are free to audit it, contribute to it, and redistribute it. This is why we have a healthy community of thousands of organizations in all sectors.
    Starting Price: €45/month/10 users
  • 41
    Zoho Vault
    Say goodbye to memorizing passwords. Let us do it for you. Zoho Vault is a secure password manager that safely manages your passwords and autofills them across websites and applications. Unlimited password storage, seamless autofill, fine-grained admin controls–Vault has it all. Get clear security insights into both your personal and business passwords. Identify any weak passwords and change them in just a few clicks. Securely store, share, and manage passwords with different levels of access privileges. You can also add notes, documents, credit cards, software licenses, SSH keys, and more to your password vault. Organize passwords and other confidential data into groups as folders and sub-folders for easy password management and bulk-sharing. Allow users to log in to their everyday apps without passwords. Our catalog readily supports hundreds of popular cloud apps, as well as options for custom integration.
  • 42
    CyberQP

    CyberQP

    CyberQP

    We provide privileged access management for MSPs, including protecting customer admin accounts and securing the identities of their customers. At CyberQP we believe that MSPs are the only solution to the cyber problem for small and medium businesses. That’s why we take our partnership with the MSP community so seriously. Create accounts and passwords on-demand when technicians need them with leading-edge security and zero-standing privilege. Automate tasks and manage privileged, admin, and service accounts across environments. Protect organizations from internal and external threats by verifying the identities of people who call your help desk in less than 30 seconds. Empower your MSP’s technicians to manage and control who has privileged access for specified periods of time. For MSPs, it can be difficult to discover admin and privileged accounts across their customer base. With our automation, we make it effortless.
    Starting Price: $300 per month
  • 43
    Devolutions PAM

    Devolutions PAM

    Devolutions

    Devolutions Privileged Access Manager (PAM) discovers privileged accounts, automates password rotation, approves check-outs, enforces just-in-time (JIT) privilege elevation, and records every session—giving small and midsize businesses (SMBs) enterprise-grade control without enterprise-grade hassle. Bundle PAM with the Privileged Access Management package and it slots straight into Devolutions Hub delivered as SaaS (Software-as-a-Service) or a self-hosted on-premises (on-prem) Devolutions Server, while Remote Desktop Manager provides one-click launches and Gateway supplies secure tunnels. One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
    Starting Price: $50/month/user
  • 44
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 45
    Osirium

    Osirium

    Osirium

    In the current world of outsourcing, it can be hard to see who has privileged access to what on your systems. These days, the lowest-paid people have the highest privileges - and they may not even work for your organization. Osirium readdresses this balance for end-user organizations and uniquely allows MSSPs to manage tens of thousands of account credentials, outsource safely and keep their clients happy on the compliance front. Those “admin” accounts can make substantial changes to those systems. For example, they can access valuable corporate IP, reveal personally identifiable information (PII), or control how customers, staff, and partners do their work. It's also worth considering the need to protect other accounts such as the corporate Facebook, Instagram, and LinkedIn accounts as improper use could cause significant reputational damage. It’s no surprise that these accounts are the most prized targets for cyber attackers as they are so powerful.
  • 46
    Privileged Access Management
    Secure your most sensitive accounts in minutes with Imprivata Privileged Access Management. Privileged accounts, those with the highest level of access, pose a greater security risk than the average end user because of the degree of sensitive information that could be exposed. This risk isn’t lost on hackers, which is why 80% of security breaches involve compromised privileged credentials. Legacy PAM solutions are complex and resource-intensive, often requiring costly engagements with outside consultants. Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
    Starting Price: $25 per month
  • 47
    BastionPass

    BastionPass

    BastionWare

    BastionPass was built out of necessity to create an all-encompassing, collaborative platform that can be utilized by family or coworkers in a manner, which other password manager solutions do not offer. Since inception, our focus has been to provide single identity management and sharing capabilities with a simple interface, creating a safe and effective solution for password management among individuals or team members. BastionPass helps manage your passwords so you won't have to. Sign in once with your master password and our plugin will log you in everywhere else automatically. Easily create unique, complex passwords for all your logins and keep them locked securely in our proprietary, triple-encrypted vault. Conveniently access, manage, or share your passwords from desktop or mobile. BastionPass was designed from the ground up to keep up with your digital life needs.
    Starting Price: $1.59 per user per month
  • 48
    Iraje Privileged Access Manager
    Privileged accounts exist everywhere. There are many types of privileged accounts and they can exist on-premises and in the cloud. They differ from other accounts as they have rights for read, write, alter, and modify. Privileged Access Management (PAM) refers to systems that secure, control, manage and monitor the accounts of users who have elevated permissions to critical, corporate assets. Anyone inside an organization with superuser privileges has the potential to crash your enterprise systems, destroy data, delete or create accounts and change passwords and cause havoc, either through carelessness, incompetence or perhaps through malicious intent. The trouble is that accounts with superuser privileges, Including shared accounts, are necessary. One cannot run enterprise IT systems without granting some people the privileges to do system-level tasks.
  • 49
    OpenText NetIQ Privileged Account Manager
    Identify privileged credentials and dependencies across the enterprise to streamline the implementation of privileged account management. Implement security controls that apply policies based on identity attributes to ensure the principle of “least privilege” is being applied. Track and record privileged activity to thwart breaches and support governance and compliance throughout the entire identity lifecycle. Support your Zero Trust strategy with a dynamic, scalable privileged access management solution that automatically adjusts access in real time. In a complex hybrid environment, uncovering every identity with elevated rights can be difficult or nearly impossible. NetIQ Privileged Account Manager enables you to identify which identities have elevated access across your entire environment and what dependencies exist, giving you the insight you need to better simplify, implement, and manage policies around privilege.
  • 50
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user