

Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM).
| Product | Mindshare (%) |
|---|---|
| CyberArk Endpoint Privilege Manager | 2.4% |
| Kron PAM | 0.7% |
| Other | 96.9% |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
CyberArk Endpoint Privilege Manager enhances security by controlling access, removing admin rights, and managing privileges. It supports diverse environments with simple integration, focusing on credential detection, threat protection, and compliance.
CyberArk Endpoint Privilege Manager secures enterprise passwords, monitors session connections, and enhances cybersecurity by controlling privileged access. It blocks unauthorized applications, monitors user activities, and secures credentials across platforms. Key areas include Just-In-Time Access, privilege separation, and local administrator password rotation. While robust, challenges exist with performance, complexity, and setup. Integration with Linux and Unix needs improvement, requiring advanced reporting tools and easier policy management. Pricing concerns and maintenance issues with Windows servers persist, as well as database issues in the on-prem version.
What are the key features of CyberArk Endpoint Privilege Manager?Organizations deploying CyberArk Endpoint Privilege Manager in industries such as finance, healthcare, and technology benefit from secure credential management across Unix, AWS, and GCP. By implementing privilege separation and monitoring user activities, they achieve effective risk mitigation and compliance across multiple platforms.
Kron PAM provides an advanced Privileged Access Management solution that effectively secures critical resources, ideal for enterprises needing enhanced security for their IT infrastructure.
Kron PAM offers comprehensive access control capabilities by managing, monitoring, and protecting privileged accounts. It simplifies compliance management and enhances security posture through seamless integration with existing systems. Businesses can mitigate risks associated with unauthorized access and potential data breaches.
What are the key features of Kron PAM?In finance industries, Kron PAM is implemented to reinforce protection against internal threats, while healthcare sectors utilize it to ensure patient data confidentiality. Its adaptability makes it a strategic choice across different fields.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.