Symantec PAM

Symantec PAM

Broadcom
+
+

Related Products

  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Securden Endpoint Privilege Manager
    7 Ratings
    Visit Website
  • Auth0
    1,029 Ratings
    Visit Website
  • Frontegg
    383 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Passwork
    85 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    516 Ratings
    Visit Website
  • MedTrainer
    241 Ratings
    Visit Website

About

BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.

About

Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Privileged accounts provide elevated and unrestricted access to users and systems and are necessary to perform key activities. Unfortunately, they are also one of the most common attack vectors because, when compromised, they enable hackers to access critical systems, steal sensitive data, and deploy malicious code. Today’s privileged access management technologies must not only enable you to create and enforce controls over users and systems that have elevated or “privileged” entitlements, but with the explosion of virtualized and cloud environments, the attack surface and number and types of privileged accounts have increased exponentially.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Large enterprises and organizations needing a tool to secure privileged access, manage identities and permissions across complex hybrid and cloud environments

Audience

Organizations that need an effective privileged access management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BeyondTrust
Founded: 1985
United States
www.beyondtrust.com/products

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/identity/pam

Alternatives

Alternatives

Categories

Categories

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

CA Auditor for z/OS

Integrations

CA Auditor for z/OS
Claim BeyondTrust Pathfinder and update features and information
Claim BeyondTrust Pathfinder and update features and information
Claim Symantec PAM and update features and information
Claim Symantec PAM and update features and information