---
description: Page 2 - Discover the best Privileged Access Management Software for your organisation. Compare top Privileged Access Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best Privileged Access Management Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Privileged Access Management Software](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software) > [Page 2](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2)

# Privileged Access Management Software

Canonical: https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software

Page: 2 / 4\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=3)

-----

## Products

1. [Conecta Suite](https://www.softwareadvice.com.au/software/366554/conecta-suite) — 4.9/5 (47 reviews) — Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team pr...
2. [Ping Identity](https://www.softwareadvice.com.au/software/150649/pingidentity) — 4.7/5 (39 reviews) — At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise...
3. [miniOrange](https://www.softwareadvice.com.au/software/342508/single-sign-on) — 4.5/5 (36 reviews) — The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provision...
4. [Passbolt](https://www.softwareadvice.com.au/software/450980/passbolt) — 4.7/5 (35 reviews) — Passbolt is the open-source password manager designed with team needs in mind, simplifying password management for or...
5. [ManageEngine AD360](https://www.softwareadvice.com.au/software/370056/manageengine-ad360) — 4.6/5 (34 reviews) — ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and ...
6. [NordLayer](https://www.softwareadvice.com.au/software/336763/nordvpn-teams) — 4.6/5 (33 reviews) — NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, ...
7. [GateKeeper Enterprise](https://www.softwareadvice.com.au/software/183910/gatekeeper-enterprise) — 5.0/5 (30 reviews) — Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA a...
8. [CyberArk Privileged Access Management Solutions](https://www.softwareadvice.com.au/software/398430/cyberark-privilege) — 4.3/5 (27 reviews) — Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries contro...
9. [Syteca](https://www.softwareadvice.com.au/software/133258/ekran-system) — 4.7/5 (26 reviews) — Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ...
10. [VISULOX](https://www.softwareadvice.com.au/software/354071/visulox) — 4.8/5 (25 reviews) — VISULOX privileged access management shows all administrative activities within the IT and OT infrastructure at a gla...
11. [Secret Server Password Manager](https://www.softwareadvice.com.au/software/155563/secret-server) — 4.7/5 (23 reviews) — Thycotic Secret Server is password and privileged access management software that helps businesses discover, manage a...
12. [ManageEngine Password Manager Pro](https://www.softwareadvice.com.au/software/376425/manageengine-password-manager-pro) — 4.3/5 (23 reviews) — ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores ...
13. [Rublon](https://www.softwareadvice.com.au/software/235282/rublon) — 4.7/5 (23 reviews) — Rublon provides cloud-based multi-factor authentication (MFA) for your workforce. Use Rublon to enable secure local a...
14. [Foxpass](https://www.softwareadvice.com.au/software/232831/foxpass) — 4.8/5 (20 reviews) — Foxpass is a cloud-based and on-premise platform that helps small to large enterprises automate threat detection and ...
15. [Genea Security](https://www.softwareadvice.com.au/software/194830/genea-access-control) — 4.8/5 (20 reviews) — Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ...
16. [VaultOne](https://www.softwareadvice.com.au/software/310095/vaultone) — 4.8/5 (20 reviews) — VaultOne offers Privileged Access Management (PAM), Identity Management (IAM) and Passwords Management (PM) into a si...
17. [AWS CloudTrail](https://www.softwareadvice.com.au/software/390818/aws-cloudtrail) — 4.6/5 (19 reviews) — AWS CloudTrail is a cloud-based solution that helps businesses manage and view all the events and activities across A...
18. [Secomea](https://www.softwareadvice.com.au/software/440313/secomea) — 4.7/5 (19 reviews) — Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It i...
19. [Passly](https://www.softwareadvice.com.au/software/429152/passly) — 4.1/5 (17 reviews) — Passly is a cloud-based identity and access management solution that provides businesses with tools to secure enterpr...
20. [HelloID](https://www.softwareadvice.com.au/software/73116/helloid) — 4.7/5 (17 reviews) — HelloID is a secure and modern cloud-based Identity \&amp; Access Management (IAM) solution that empowers organization...
21. [Acre Security](https://www.softwareadvice.com.au/software/117687/tds-visitor) — 4.9/5 (14 reviews) — TDS Visitor is an industry-leading enterprise visitor management solution that provides a unified view of all visitor...
22. [Tehama](https://www.softwareadvice.com.au/software/246987/tehama) — 4.4/5 (13 reviews) — Tehama is a digital workplace software that helps businesses manage employees, products, finances, sales, expenses, a...
23. [Password Safe](https://www.softwareadvice.com.au/software/214351/password-safe) — 4.7/5 (10 reviews) — BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, ...
24. [Ezeelogin](https://www.softwareadvice.com.au/software/473568/Ezeelogin-SSH-Gateway) — 4.8/5 (10 reviews) — Ezeelogin is a self-hosted jump server solution that enables secure SSH access to Linux servers, routers, switches an...
25. [Vault](https://www.softwareadvice.com.au/software/121528/vault) — 4.8/5 (9 reviews) — Vault by HashiCorp is a cloud-based encryption and secrets management solution, which helps small to large organizati...

-----

Page: 2 / 4\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=3)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.com.au/directory/4528/security/software)
- [Password Management Software](https://www.softwareadvice.com.au/directory/4585/password-management/software)
- [Authentication Software](https://www.softwareadvice.com.au/directory/4311/authentication/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.com.au/directory/4433/network-access-control/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.com.au/directory/4427/ciam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@type":"WebSite","@id":"https://www.softwareadvice.com.au/#website","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Privileged Access Management Software","description":"Page 2 - Discover the best Privileged Access Management Software for your organisation. Compare top Privileged Access Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2","about":{"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#webpage","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Privileged Access Management Software","position":2,"item":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best Privileged Access Management Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Conecta Suite","position":1,"description":"Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.\nBy integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.\nConecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:\n✅ Automatic email signature reapplication;\n✅ Access restrictions by time, system, browser, and IP;\n✅ Custom shift scheduling;\n✅ Automatic or manual device disconnection;\n✅ Deactivation of licenses for former employees;\n✅ Detailed reports on logins and file sharing;\n✅ Custom login screen with company branding;\n✅ Email and Drive file migration between users","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6430a9a4-eb31-4865-a5cb-12699bdde077.png","url":"https://www.softwareadvice.com.au/software/366554/conecta-suite","@type":"ListItem"},{"name":"Ping Identity","position":2,"description":"At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. We champion every identity. \n\nHow do we do it? Through a no-code, drag-and-drop canvas that allows enterprises of all sizes to orchestrate and iterate their identity flows. From designing user experiences to automating identity workflows to methodically migrating users from different data stores, our orchestration tool allows anyone to design flows that integrate all your chosen identity vendors.\n\nIdentity has traditionally been a highly specialized skill set but now requires input from technical and non-technical audiences. Ping’s orchestration solution unleashes the potential of identity by enabling people at various levels to create, test, optimize and deploy user experiences through no-code integrations and flows.\n\n\t•\tIntegrate new products and services with speed and precision\n\t•\tStreamline multi-vendor architectures without custom coding\n\t•\tExplore new ways to engage users and optimize workflows with minimal disruption\n\nPing offers hundreds of integration kits, connectors, and productized flows to easily deploy the following capabilities:\n\t•\tIdentity Verification\n\t•\tCredential Issuance\n\t•\tProfile Management\n\t•\tSingle Sign-On / Authentication\n\t•\tMulti-Factor Authentication\n\t•\tAuthorization\n\t•\tThreat Insights\n\nWith Ping Identity’s PingOne Cloud platform, you can have your choice of multiple deployment options, no matter where you are on your cloud migration or digital transformation journey. We offer solutions that work across hybrid, multi-cloud, multi-generational, cloud-first, or completely on-premise environments.\n\nWe serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/026a740e-5e5f-480b-94d5-19e12e157521.png","url":"https://www.softwareadvice.com.au/software/150649/pingidentity","@type":"ListItem"},{"name":"miniOrange","position":3,"description":"The simplest platform which integrates thousands of applications with convenient features such as SSO, MFA, Provisioning, etc. with any user source - AD, Azure AD, Okta, miniOrange.\n\nThe product offers comprehensive features such as Single-Sign-On, Multi-Factor Authentication, User Provisioning, Identity & Cross-Protocol Brokering, etc.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4accf338-6e3b-4e2a-bda6-3039afcf2f22.png","url":"https://www.softwareadvice.com.au/software/342508/single-sign-on","@type":"ListItem"},{"name":"Passbolt","position":4,"description":"Passbolt is the open-source password manager designed with team needs in mind, simplifying password management for organizations by offering a secure platform usable with confidence by everyone from tech teams to non-technical staff. It aids in preventing the common pitfalls of password sharing while ensuring that all data remains under the organization's control on its servers.\n\nWhy Choose Passbolt?\n\nEase of Use: Featuring an intuitive interface, Passbolt is developed for easy adoption across various levels of tech proficiency, enabling effective management and sharing of passwords by anyone.\n\nSecurity and Privacy First: Utilizing OpenPGP encryption to secure data, Passbolt aligns with the highest standards of data protection, offering assurance that sensitive information is secure.\n\nFull Control of Data: Being a self-hosted solution allows organizations to retain all data on their premises, which is vital for compliance with strict regulations like GDPR.\n\nEmpowering Collaboration: With role-based access control, Passbolt enables managers to set precise user permissions, ensuring team members have appropriate access to necessary tools.\n\nDedicated Support: Recognizing the importance of reliable support, Passbolt provides comprehensive documentation, community support, and optional professional services to guide users at every step.\n\nPassbolt is more than a password manager; it is a solution that promotes collaboration, enhances security, and supports daily operations without adding complexity. Ideal for organizations that prioritize security, privacy, and ease of use, Passbolt ensures that password management is no longer burdensome but a seamless aspect of the operational workflow.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad3a7ddb-399b-4757-97ca-7dc70f63b1e1.png","url":"https://www.softwareadvice.com.au/software/450980/passbolt","@type":"ListItem"},{"name":"ManageEngine AD360","position":5,"description":"ManageEngine AD360 is an integrated identity and access management solution that assists organizations to manage and secure user identities, facilitate identity governance, and ensure compliance. It provides in-depth access management for Microsoft Active Directory, M 365, G Suite, and other target systems. Its key capabilities include adaptive authentication, auditing, compliance, identity lifecycle management, actionable reporting, user behavior analytics (UBA), multi-factor authentication (MFA), and single sign-on (SSO). \n\nAutomated A360 facilitates identity lifecycle management by automating routine tasks such as user provisioning, modification, deprovisioning, and other administrative tasks across target systems such as Active Directory, Microsoft 365 and Exchange Server. This helps eliminate errors and redundancies introduced by humans and enhances productivity. \n\nIts actionable reporting and ML powered UBA employs user-behavior analytics, powered by machine learning (ML) algorithms to detect anomalies in user behavior and provides intelligent threat alerts. This provides advanced security insights with precision, and helps prevent false alarms. UBA also provides instant alerts to administrators when unusual logon activity, privilege escalation, and other anomalous behavior are detected. \n\nManageEngine AD360 provides administrators with real-time audit reports and alerts on critical changes made to Active Directory and Azure Active Directory environments. It also allows administrators to monitor and analyze logon activities, lockouts, and password changes to help ensure regulatory compliance. It also provides reports for IT regulatory mandates such GDPR, SOX, PCI, HIPAA, FISMA, and GLBA, to streamline compliance management and prevent regulatory risks.\n \nIts identity analytics and reporting features help users perform risk-based adaptive authentication using identity analytics tools that exploit big data, machine learning (ML), and artificial intelligence (AI) technologies to ensure accuracy and mitigate identity-related risks. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint to detect and remove excessive user privileges, monitor privileged accounts, and to detect separation of duty (SOD) violations. \n\nManageEngine AD360 provides contextual multi-factor authentication methods, to extend an additional layer of security and curb identity-related attacks. A wide range of authentication methods including SMS verification, biometric verification, Google authenticator, and RADIUS are supported. Besides MFA, AD360 supports single sign-on (SSO) across SAML based applications. Risk-based adaptive authentication is performed using several factors such as user location, IP address, time of previous logon, and device footprint. This is crucial for detecting and removing excessive user privileges, monitoring privileged accounts, and detecting separation of duty (SOD) violations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6be9101b-2d31-46ec-97f0-29fcb80874e7.jpeg","url":"https://www.softwareadvice.com.au/software/370056/manageengine-ad360","@type":"ListItem"},{"name":"NordLayer","position":6,"description":"NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, protection, detection, and response for companies adapting to hybrid work and evolving cybersecurity needs. Built on NordVPN standards, it offers trusted network security with flexible yet robust protection that integrates with any setup.\n\nSecuring remote and hybrid teams requires granular access controls and strong identity verification to prevent cyber threats. NordLayer enables IT teams to manage security through Identity & Access Management (IAM), device posture monitoring, and context-based access policies. Employees can authenticate with biometric verification, one-time passwords (OTP), or Single Sign-On (SSO) integrations with major providers.\n\nThe platform-based approach ensures comprehensive security without disrupting workflows. As a hardware-free, cloud-based solution, NordLayer deploys quickly, adapts to existing infrastructure, and scales with business growth.\n\nSome key features include:\n\n• Cutting-edge Business VPN: Provides encrypted access to company resources while maintaining privacy and compliance\n• Cloud LAN: Securely connects distributed teams, enabling file sharing, troubleshooting, and remote collaboration\n• Zero Trust Network Access (ZTNA): Ensures only authorized users can access business-critical applications and data\n• Cloud Firewall: Creates granular security rules to control and filter network traffic\n• Device Posture Monitoring: Checks device compliance with security policies, blocking risky endpoints before they access the network\n• Threat Protection: Shields employees from malware, phishing, and malicious downloads through deep packet inspection (Lite) and file scanning\n\nWith NordLayer, businesses maintain security across multiple locations. Network segmentation, traffic filtering, and private gateways ensure company data stays protected. The Business VPN, built on up to 1 Gbps servers across 40+ locations, encrypts traffic using AES-256 and ChaCha20 encryption, reducing the risk of cyber-attacks.\n\nNordLayer offers quick deployment, with onboarding in under 10 minutes and an intuitive Control Panel for managing security policies, monitoring access, and handling billing. 24/7 active support ensures quick resolution, with an average response time of 44 seconds.\n\nNordLayer is a scalable, compliance-ready solution that keeps businesses secure without complexity. Flexible pricing, no vendor lock-in, and integrations with leading identity providers allow companies to adapt security to their needs.\n\n--\n\nIf you’re looking for a partnership, check out the NordLayer Partner Program for MSPs, resellers, and agents. Partners benefit from high-profit margins, dedicated training, 24/7 support, and no upfront investment.\n\nLearn more: nordlayer.com/partner-program","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81bce581-210b-4f70-b9dc-8023c4b3d2c5.png","url":"https://www.softwareadvice.com.au/software/336763/nordvpn-teams","@type":"ListItem"},{"name":"GateKeeper Enterprise","position":7,"description":"Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA and automatically lock computers. If a new user logs in with the same account, the solution will automatically start a new session and log out the previous user's session. All with automatic computer lock when users leave. Perfect for high-tempo environments. \n\nGateKeeper Enterprise is a proximity-based access control solution that helps businesses minimize unauthorized data exploitation via user authentication, password management and more. Professionals can utilize the admin console to manage access control lists for specific devices, assign users to workstations and deploy various security policies such as two-factor authentication across the system.\n\n\nGatekeeper Enterprise allows organizations to monitor ongoing activities and maintain audit logs in compliance with industry regulations. Managers can provide employees with wireless access keys/tokens to unlock assigned system devices and automate the login process. Additionally, it lets users track the location of network devices and generate analytical reports. \n\n\nGatekeeper Enterprise comes with an administrative dashboard, which enables businesses to view real-time event logs and filter data based on credentials, computers or activity. Pricing is based on the number of users and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fb1ed6b7-9294-4aa8-a6a5-aadc0e23d6c0.png","url":"https://www.softwareadvice.com.au/software/183910/gatekeeper-enterprise","@type":"ListItem"},{"name":"CyberArk Privileged Access Management Solutions","position":8,"description":"Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information leaks, assess risks and generate custom reports via a unified platform.\n\n\nIt lets administrators prevent unauthorized users from accessing privileged account credentials using access control capability. Cyberark Privilege allows supervisors to synchronize users’ privileged account passwords and SSH keys across multiple devices including smartphones, tablets or PCs. Additionally, it offers a host of features such as onboarding, permissions management, task tracking, configurable workflows, threat detection and analytics.\n\n\nCyberark Privilege comes with an API, which facilitates integration with several third-party platforms, such as ServiceNow, OneLogin, Docker Cloud, SAP, Splunk, Workday and more. Pricing is available on request and support is extended via phone, email and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e64cd799-8ecc-42d4-ad8c-c52ef4914cdd.png","url":"https://www.softwareadvice.com.au/software/398430/cyberark-privilege","@type":"ListItem"},{"name":"Syteca","position":9,"description":"Syteca — control privileged access and detect identity threats in one place.\n\nSyteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start.\n\nThe platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process).\n\nSyteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments.\n\nLicensing is modular — you select and pay for the capabilities you actually need.\nTrusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f6aa506-c463-447c-aa69-7e75a8205443.jpeg","url":"https://www.softwareadvice.com.au/software/133258/ekran-system","@type":"ListItem"},{"name":"VISULOX","position":10,"description":"VISULOX privileged access management shows all administrative activities within the IT and OT infrastructure at a glance. Use the option of secure desktop sharing with session recording to support operation teams, release VPN-free applications or revoke access.\n\nAccess can be granted on request only when it is immediately needed. In this way, SLA requirements can be met automatically. Access outside the defined specifications is not possible. Dedicated access points for all external users and internal administrators allow internal and external staff to collaborate efficiently and manage the entire organization securely.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/562244f2-a114-4eab-9b59-19ad74f3bd62.png","url":"https://www.softwareadvice.com.au/software/354071/visulox","@type":"ListItem"},{"name":"Secret Server Password Manager","position":11,"description":"Thycotic Secret Server is password and privileged access management software that helps businesses discover, manage and secure accounts credentials at all levels in the organization. Its key features include secrets vault, application access control, privilege management and password security.\n\n\nSecret Server enables users to identify services, administrators, applications and root accounts and manage privileged credentials in an encrypted, centralized vault. It provides role-based access control to monitor security and administer compliance across the organization. It comes with additional services to handle passwords, least privilege policies, internet of things (IoT) security, malware and ransomware protection.\n\n\nSecret Server caters to various industries such as health care, financial services, energy, utilities, government, legal, education and public safety. It can either be deployed on-premise or hosted in the cloud. Support is available via phone and email, chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8587225f-47e4-43c7-b3dd-5ba7ea6a163e.png","url":"https://www.softwareadvice.com.au/software/155563/secret-server","@type":"ListItem"},{"name":"ManageEngine Password Manager Pro","position":12,"description":"ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b277f6af-1b08-4a21-a0d9-861949693d0f.jpeg","url":"https://www.softwareadvice.com.au/software/376425/manageengine-password-manager-pro","@type":"ListItem"},{"name":"Rublon","position":13,"description":"Rublon provides cloud-based multi-factor authentication (MFA) for your workforce. Use Rublon to enable secure local and remote access to networks, servers and applications. SMBs and enterprises use Rublon to protect their information and to comply with data protection regulations like HIPAA and GDPR.\n\nRublon's numerous connectors allow you to enable MFA with almost any technology used in your business: VPNs (Array Barracuda, AWS, Check Point, Cisco, Citrix, F5, Fortinet, OpenVPN, Palo Alto, Pulse Connect, SonicWall, Sophos), RDP, RDS (RD Gateway & Web Access), Windows Logon, SSH, Linux Desktop, any cloud application via SAML as well as on-premise apps.\n\nUse Active Directory or OpenLDAP as an identity provider for all your MFA logins.\n\nEnable one-click access to cloud applications using Rublon's SSO Portal.\n\nVerify user logins using software- and hardware-based authentication methods: U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode, Email Link. Rublon Authenticator is required for Mobile Push and Mobile Passcode (available for iPhone and Android).\n\nUse Rublon's Admin Console to set global and application-specific policies that define available authentication methods, authorized networks and remembered devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d6c6ce5-0987-4c60-8285-b631e15eacdc.png","url":"https://www.softwareadvice.com.au/software/235282/rublon","@type":"ListItem"},{"name":"Foxpass","position":14,"description":"Foxpass is a cloud-based and on-premise platform that helps small to large enterprises automate threat detection and access control process across servers and networks. It provides local cache, which enables users to keep systems running during downtime and connectivity issues.\n\n\nFoxpass allows businesses to enforce SSH keys and set password requirements for Wifi, VPN and servers. It lets users log Lightweight Directory Access Protocol (LDAP) and RADIUS requests for threat detection and debugging, providing visibility into the system's infrastructure. Additionally, enterprises can automatically connect to wireless networks without signing in with credentials by uploading root certificates for authentication.\n\n\nFoxpass comes with an application programming interface (API), which allows enterprises to control server access, modify the system and integrate it with various third-party systems. Pricing is available on monthly and annual subscriptions and support is extended via live chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0bb6628c-333c-46cb-9e8b-f2e5e4568b6e.png","url":"https://www.softwareadvice.com.au/software/232831/foxpass","@type":"ListItem"},{"name":"Genea Security","position":15,"description":"Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ensure the security of access across building facilities. Key features include attendance reports, credential management, key assignment and access control. \n\nBuilding teams using Genea Access Control can assign mobile keys from any device and monitor all access activity. Office administrators can assign both mobile keys and physical key fobs and cards to employees, allowing them to open gates and doors using mobile devices. The solution enables managers to assign separate access credentials to employees based on their roles. Additionally, the access control portal allows organizations to monitor all access activities in real-time by viewing all event logs including doors being held open and force attempts. \n\nGenea Access Control also lets teams lock and unlock doors remotely and integrate the platform with existing systems and other third-party applications, such as Okta, Slack, GSuite and more. Support is extended via phone, email, live chat and inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b62fd9df-c63c-4ff1-82f5-2e3889a17a85.png","url":"https://www.softwareadvice.com.au/software/194830/genea-access-control","@type":"ListItem"},{"name":"VaultOne","position":16,"description":"VaultOne offers Privileged Access Management (PAM), Identity Management (IAM) and Passwords Management (PM) into a single solution that can help businesses avoid data breaches caused by the abuse of privileges. With VaultOne, administrators can:\n\n- Manage privileged passwords in one place, without the need for any additional software or hardware\n\n- Ensure that only authorized users have access to sensitive data through comprehensive identity management capabilities\n\n- Reduce the risk of a data breach by monitoring user activity using behavioural analytics","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8e49f6c6-dcc1-449c-a87d-ea59570ef0d6.png","url":"https://www.softwareadvice.com.au/software/310095/vaultone","@type":"ListItem"},{"name":"AWS CloudTrail","position":17,"description":"AWS CloudTrail is a cloud-based solution that helps businesses manage and view all the events and activities across AWS accounts on a centralized platform. Professionals can detect threats, vulnerabilities, or anomalous behavior across accounts, including an increase in resource provisioning or other available services. \n\nAWS CloudTrail allows organizations to centralize log files and encrypt them to secure confidential information and prevent unauthorized data exploitation. Managers can conduct security analysis, ensure compliance with various regulatory standards and perform troubleshooting operations. \n\nAWS CloudTrail integrates with Amazon CloudWatch Events, which enables businesses to configure workflows according to requirements.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f2920168-5bcf-4adf-a89a-107210a6091b.png","url":"https://www.softwareadvice.com.au/software/390818/aws-cloudtrail","@type":"ListItem"},{"name":"Secomea","position":18,"description":"Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage their machines and prevent downtime.\n\nSecomea's solution integrates with any OT equipment, allowing organizations to secure their cyber-physical systems. This enables technicians to remotely access and intervene in production facilities, reducing travel expenses, response time, and security risks.\n\nThe implementation of Secomea's solution typically requires just one day per site. With a user-friendly and intuitive interface, Secomea aims to simplify secure remote access while maintaining global oversight and local control.\n\nSecomea's features:\n\nIdentity and access management features:\n\n- Privileged access management: Set up hierarchy-based user roles based on the principle of least privilege\n- Granular access control: Control access on an individual level with granular permissions\n- Advanced grouping: Perform mass administration of user permissions\n- Just-in-time (JIT) access: Grant temporary or scheduled access to specific assets\n- Always-on access: Set up a static, persistent tunnel connection between two separate networks\n- Request for access: Users can request access to specific assets, and admins can approve it in one click\n- Multi-Factor Authentication (MFA): Verify users’ identities via MFA with SMS authentication\n- Single Sign-On (SSO): Secure users’ authentication via Single Sign-On (SSO) with Azure AD or Okta\n\nRemote access features:\n\n- Agentless, web-based system: Use Secomea directly from your browser – no need to install a plugin or application\n- Direct access via lightweight client: Supporting OT protocols such as Modbus, Profinet, EtherCAT, Ethernet/IP, etc.\n- Indirect and clientless access: Supporting remote access from your browser via RDP, VNC, SSH, Telnet, HTTPS\n- Secure file transfer: Scan files transferred remotely for viruses or malware to assess their safety\n\nAudit and monitoring:\n\n- Real-time activities monitoring: Get an overview of ongoing remote access sessions from the Prime Dashboard\n- Audit logs: Track every activity performed on your machines to document who did what and when\n- Session recordings: Capture videos of remote access sessions for troubleshooting and audit purposes\n- Alerts and automated actions: Get SMS/email notifications for specific events and automate triggered actions\n- Access gateways information: Get a centralized overview of all gateways with detailed info (serial number, IP, firmware, last heartbeat). Register info on their physical location and contact details for streamlined operations\n- Vulnerability hub: Spot gateways that are not running the latest firmware version and those whose models are approaching End of Life or End of Support to ensure timely updates and replacements\n\nCustomization and integrations:\n- API access: Integrate Secomea with other tools you use to run your operations\n- AD integration: Changes implemented in Microsoft Azure Active Directory are synced hourly in Secomea’s access management server.\n- Security Information and Event Management (SIEM) integration: Integrate your SIEM system (Syslog, Splunk, etc.) with Secomea\n- Data Collection Module (DCM) and cloud integration\n- Collect data from your industrial equipment using its native data collection protocols (OPC UA, Modbus TCP, Siemens S7, Ethernet/IP, MQTT, etc.) and send it to your chosen cloud solution for further processing (Microsoft Azure IoT Hub, Amazon AWS IoT Core, Software AG Cumulocity IoT, Aveva Insight, MQTT data servers, etc.)\n- Support system integration: Integrate your support system with Secomea’s to centralize ticket management\n- Branding: Customize your URL and login page to align it with your corporate brand.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4ef015ad-ad45-47d0-9bc4-3367d535d5f0.jpeg","url":"https://www.softwareadvice.com.au/software/440313/secomea","@type":"ListItem"},{"name":"Passly","position":19,"description":"Passly is a cloud-based identity and access management solution that provides businesses with tools to secure enterprise data from potential cybersecurity threats. Professionals can configure users’ access permissions and store passwords for applications, machines or other resources in a centralized vault.\n\nPassly allows organizations to automatically request password resets at regular intervals and quickly identify security incidents to facilitate remediation processes. Managers can verify users’ identities via multi-factor authentication (MFA) and streamline logins through single sign-on (SSO) capabilities. Additionally, it lets supervisors ensure compliance with various industry regulations, such as PCI-DSS, HIPAA, CJIS and more.\n\nPassly enables businesses to integrate the application with various third-party applications. Pricing is available on request and support is extended via live chat, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/40043f88-302c-486c-9c68-d1324d4c7d99.png","url":"https://www.softwareadvice.com.au/software/429152/passly","@type":"ListItem"},{"name":"HelloID","position":20,"description":"HelloID is a secure and modern cloud-based Identity & Access Management (IAM) solution that empowers organizations and educational institutions to take control of their user provisioning, self-service, and single sign-on needs. Automate the full user lifecycle process with HelloID by connecting your Human Resource software or Student Information System data to all your downstream systems. Account details and usage rights are automatically updated, which increases security and reduces human error. HelloID puts the power of Identity Management into your hands to tackle your current and future needs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/04c4876d-72c4-4ff1-aad4-59bc11c6bd38.png","url":"https://www.softwareadvice.com.au/software/73116/helloid","@type":"ListItem"},{"name":"Acre Security","position":21,"description":"TDS Visitor is an industry-leading enterprise visitor management solution that provides a unified view of all visitors across multiple locations. The system streamlines the visitor process, managing the full visitor lifecycle end-to-end from pre-registration to check-in and check-out.\n\nWhen planning for and welcoming visitors to your site, TDS Visitor provides unrivaled functionality including pre-registration and self-service check-in, to notifying hosts of visitor arrivals and checking out. The visitor system ensures all appropriate health, safety and legal requirements are met and all visitors have been accounted for effectively.\n\nThe TDS Visitor solution also extensively integrates into existing workplace applications, making the solution easy-to-use, navigate and maintain company-wide. The solution has deep integration capabilities with your existing security, HR, building management and CRM systems including well-known applications such as Office 365, G Suite, Salesforce, SAP, Workday, Slack and Docusign, among over 125+ applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f726b7aa-9302-4a49-8244-3d62e6cc15f5.jpeg","url":"https://www.softwareadvice.com.au/software/117687/tds-visitor","@type":"ListItem"},{"name":"Tehama","position":22,"description":"Tehama is a digital workplace software that helps businesses manage employees, products, finances, sales, expenses, and more on a unified interface. The platform enables teams to handle employee schedules, payroll, inventory, sales, and customer service. \n\nAdministrators can forecast future demands based on current sales and inventory levels. Additionally, Tehama allows operators to create and assign orders to different employees and track stock levels in real-time on a centralized dashboard.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d4e8c1d-d763-4a3c-a47c-404698dbb5c1.png","url":"https://www.softwareadvice.com.au/software/246987/tehama","@type":"ListItem"},{"name":"Password Safe","position":23,"description":"BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential. Password Safe enables organizations to achieve complete control and accountability over privileged accounts","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f7c4215-e667-4fa4-9028-5ab47d943aea.png","url":"https://www.softwareadvice.com.au/software/214351/password-safe","@type":"ListItem"},{"name":"Ezeelogin","position":24,"description":"Ezeelogin is a self-hosted jump server solution that enables secure SSH access to Linux servers, routers, switches and cloud instances. The platform offers two-factor authentication to verify user identities and enhance security and compliance. Ezeelogin includes role-based access control to manage user permissions. Additionally, its privileged access management functions such as SSH key rotation and root password management, help organizations meet various security compliance standards. Ezeelogin's security features ensure organizations can safeguard their systems and data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/225099f7-b037-47f6-a11e-e126b93c8bbf.png","url":"https://www.softwareadvice.com.au/software/473568/Ezeelogin-SSH-Gateway","@type":"ListItem"},{"name":"Vault","position":25,"description":"Vault by HashiCorp is a cloud-based encryption and secrets management solution, which helps small to large organizations securely store and control access to passwords, tokens, certificates, encryption keys and various other confidential data. Features include disaster recovery, replication, audit logs, key rolling and multi-factor authentication. Vault’s Primary use cases include: - Static & Dynamic Secrets Management - Secrets Rotation - Identity Brokering - Data Encryption - Certificate Management - Secret Scanning.\n\nVault has several versions including: - Self Managed Vault Enterprise - HCP Vault Dedicated - HCP Secrets (Multi-Tenant)\n\nThe application enables users to create, remove and rotate secrets, manage authorization and generate time-based tokens for automatic or manual revocation. Administrators can create and manage policies to authorize access across infrastructure and detect user identities through their logins. It also allows enterprises to protect sensitive data with one-way masking and two-way transformations. \n\nVault offers integration with multiple third-party applications such as Microsoft Azure, Okta, MySQL, MongoDB and more. It is an open-source platform and pricing for enterprises is available on request. Support is extended via documentation, forum and online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/810fb839-0859-48c8-97e1-e2023c9056d0.png","url":"https://www.softwareadvice.com.au/software/121528/vault","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software?page=2#itemlist","numberOfItems":25}
</script>
