No more typing reviews! Try our Samantha, our new voice AI agent.

When evaluating Privileged Identity Management, what aspect do you think is the most important to look for?

Ariel Lindenfeld - PeerSpot reviewer
VP Product at PeerSpot
  • 9
  • 42
PeerSpot user

7 Answers

Last answered Oct 6, 2024
Rivka Alexander - PeerSpot reviewer
Content Specialist at PeerSpot
Real User
Oct 6, 2024
Search for a product comparison in Privileged Access Management (PAM)
it_user522663 - PeerSpot reviewer
Director, Technology Operations and Engineering at a tech services company with 51-200 employees
Real User
Feb 9, 2017
it_user856170 - PeerSpot reviewer
Consultant at a tech company with 51-200 employees
Real User
Apr 14, 2018
MV
CyberArk PAS Solution Professional | Project Manager at a tech services company with 10,001+ employees
Real User
Top 20
Feb 14, 2017
it_user593739 - PeerSpot reviewer
Identity Management & Security Market Expert // Microsoft MVP at a tech consulting company with 51-200 employees
Real User
Feb 10, 2017
it_user345867 - PeerSpot reviewer
Director of Marketing at a tech vendor with 51-200 employees
Vendor
Feb 9, 2017
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,438 professionals have used our research since 2012.
it_user452586 - PeerSpot reviewer
Managing Consultant at a tech services company with 10,001+ employees
Real User
Feb 9, 2017
Privileged Access Management (PAM)
Privileged Access Management (PAM) solutions provide organizations with the ability to secure, control, and monitor access to critical information and resources by privileged users. PAM is crucial for businesses that need to safeguard sensitive data and maintain compliance with industry regulations. It restricts privileged access to only those users who need it and tracks their activities, helping prevent security breaches. Solutions in the PAM category offer comprehensive tools to manage...
Download Privileged Access Management (PAM) ReportRead more

Privileged Access Management (PAM) experts

HarshalJethwa - PeerSpot reviewer
Cloud Operations Engineer at a tech vendor with 51-200 employees
Tejas Jain - PeerSpot reviewer
Sr. Cloud Security Architect at a tech services company with 11-50 employees
Mohamed Fouad - PeerSpot reviewer
Cybersecurity Team Leader at EMAK For Computer Manufacturing (ECM)
Suraj Varma - PeerSpot reviewer
Senior Network Security Engineer at DigitalTrack Solutions Pvt Ltd
BasilJiji - PeerSpot reviewer
System Engineer at a retailer with 10,001+ employees
Abhinandan Yadav - PeerSpot reviewer
Network Security Engineer at Arrow PC Network Pvt Ltd
Vanga Sainithinreddy - PeerSpot reviewer
Product Developer at a tech vendor with 10,001+ employees
Vivek_Jaiswal - PeerSpot reviewer
Cyber Security Senior Specialist at a tech vendor with 10,001+ employees