---
description: Discover the best Privileged Access Management Software for your organisation. Compare top Privileged Access Management Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Privileged Access Management Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Privileged Access Management Software](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software)

# Privileged Access Management Software

Canonical: https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software

Page: 1 / 4\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software?page=2)

-----

## Products

1. [ManageEngine PAM360](https://www.softwareadvice.co.uk/software/361414/pam360) — 4.3/5 (9 reviews) — ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to...
2. [JumpCloud Directory Platform](https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (264 reviews) — JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or ...
3. [Keeper Security](https://www.softwareadvice.co.uk/software/372934/keeper-password-manager) — 4.7/5 (505 reviews) — Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file stora...
4. [Bitwarden](https://www.softwareadvice.co.uk/software/182800/bitwarden) — 4.7/5 (213 reviews) — Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store ...
5. [Netwrix Privilege Secure](https://www.softwareadvice.co.uk/software/338168/sbpam) — 4.3/5 (4 reviews) — Netwrix is a cloud-based access management software that can help users minimize the risk inherent in privileged acco...
6. [Heimdal Privileged Access Management](https://www.softwareadvice.co.uk/software/242915/heimdal-privileged-access-management) — 4.6/5 (22 reviews) — Heimdal Privileged Access Management is a PAM solution designed to simplify and segment the management of admin right...
7. [ManageEngine ADManager Plus](https://www.softwareadvice.co.uk/software/361323/manageengine-admanager-plus) — 4.5/5 (83 reviews) — ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD managem...
8. [Genea Security](https://www.softwareadvice.co.uk/software/194830/genea-access-control) — 4.8/5 (20 reviews) — Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ...
9. [Rippling](https://www.softwareadvice.co.uk/software/410674/rippling) — 4.9/5 (4614 reviews) — Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operatio...
10. [BeyondTrust Remote Support](https://www.softwareadvice.co.uk/software/127126/bomgar) — 4.6/5 (2009 reviews) — BeyondTrust Remote Support helps you to support all of your systems over the web, even if they are behind firewalls y...
11. [ScreenConnect](https://www.softwareadvice.co.uk/software/390169/ScreenConnect) — 4.7/5 (1895 reviews) — ScreenConnect is a cloud-based operations management solution that allows technicians to perform remote support, gain...
12. [Okta](https://www.softwareadvice.co.uk/software/419181/okta) — 4.7/5 (930 reviews) — Okta is a workforce identity management platform designed to provide centralized access control and user administrati...
13. [Cisco Duo](https://www.softwareadvice.co.uk/software/430527/duo-security) — 4.7/5 (548 reviews) — Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any use...
14. [SecureLink](https://www.softwareadvice.co.uk/software/46985/securelink) — 4.2/5 (176 reviews) — SecureLink is the industry leader in critical access management, empowering organizations to secure access to their m...
15. [Auth0](https://www.softwareadvice.co.uk/software/107607/auth0) — 4.7/5 (137 reviews) — Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any applicati...
16. [LogMeOnce](https://www.softwareadvice.co.uk/software/407877/logmeonce) — 4.8/5 (130 reviews) — LogMeOnce is a cloud-based password and identity management solution that enables businesses of all sizes to manage l...
17. [Veriato Workforce Behavior Analytics](https://www.softwareadvice.co.uk/software/380080/cerebral) — 4.2/5 (127 reviews) — At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, ...
18. [GoodAccess](https://www.softwareadvice.co.uk/software/186523/goodaccess) — 4.9/5 (103 reviews) — GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Tru...
19. [OneLogin](https://www.softwareadvice.co.uk/software/143308/onelogin) — 4.6/5 (92 reviews) — OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web ...
20. [Teramind](https://www.softwareadvice.co.uk/software/156340/teramind) — 4.7/5 (92 reviews) — Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM...
21. [Ivanti Connect Secure](https://www.softwareadvice.co.uk/software/451208/Connect-Secure) — 4.5/5 (90 reviews) — Ivanti Connect Secure is a SSL VPN solution. It provides remote and mobile users access to corporate resources from a...
22. [Passportal](https://www.softwareadvice.co.uk/software/91798/solarwinds-passportal) — 4.4/5 (89 reviews) — N-able Passportal is a cloud-based solution, which helps small to large managed service providers (MSPs) automate pas...
23. [ThreatLocker](https://www.softwareadvice.co.uk/software/314278/threatlocker) — 4.9/5 (87 reviews) — Stop ransomware\! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint se...
24. [Perimeter 81](https://www.softwareadvice.co.uk/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
25. [ManageEngine ADAudit Plus](https://www.softwareadvice.co.uk/software/361342/manageengine-adaudit-plus) — 4.4/5 (71 reviews) — ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensiv...

-----

Page: 1 / 4\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software?page=2)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Password Management Software](https://www.softwareadvice.co.uk/directory/4585/password-management/software)
- [Authentication Software](https://www.softwareadvice.co.uk/directory/4311/authentication/software)
- [Network Access Control (NAC) Software](https://www.softwareadvice.co.uk/directory/4433/network-access-control/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.co.uk/directory/4427/ciam/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4241/privileged-access-management/software> |
| en | <https://www.softwareadvice.com/privileged-access-management/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4241/privileged-access-management/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4241/privileged-access-management/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4241/privileged-access-management/software> |
| fr | <https://www.softwareadvice.fr/directory/4241/privileged-access-management/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Privileged Access Management Software","description":"Discover the best Privileged Access Management Software for your organisation. Compare top Privileged Access Management Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software","about":{"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Privileged Access Management Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Best Privileged Access Management Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"ManageEngine PAM360","position":1,"description":"ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to critical enterprise systems. It offers a unified approach to managing privileged accounts, sessions, and access workflows within an organization's IT infrastructure. This platform is suitable for digital-first enterprises, government agencies, and various industries aiming to enhance security and meet compliance requirements.\n\nThe solution includes features such as privileged account and session management, privilege elevation and delegation management, and cloud infrastructure entitlements management. PAM360 allows organizations to discover and manage privileged accounts automatically, implement just-in-time privilege elevation, monitor cloud entitlements, and apply detailed controls for endpoint privilege management. It also provides privileged user behavior analytics with AI and ML-driven anomaly detection to identify suspicious activities and potential security threats.\n\nManageEngine PAM360 includes secrets management to secure credentials for non-human entities such as applications, services, and DevOps pipelines. It offers encryption key and certificate lifecycle management to prevent service downtime and impersonation attacks. PAM360 is designed to meet compliance standards including NIST, PCI-DSS, FISMA, HIPAA, SOX, and ISO-IEC 27001, with flexible deployment options and an intuitive user interface for streamlined implementation and operation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/221979f6-48e9-4b78-ac1d-9d414890f83c.png","url":"https://www.softwareadvice.co.uk/software/361414/pam360","@type":"ListItem"},{"name":"JumpCloud Directory Platform","position":2,"description":"JumpCloud Directory-as-a-Service is an IT Management software, which helps businesses of all sizes manage devices or workstations including Windows, MacOS, and Linux, access to IT resources, and user identities. The solution provides a centralized identity, which allows administrators to manage system security policies, multi-factor authentication processes, and public SSH keys.\n\n\nProfessionals can utilize its self-service portal to execute commands across multiple servers, control file storage infrastructure, and manage users as an individual or as part of groups. JumpCloud Directory-as-a-Service provides single sign-on functionality to access various applications including Slack, Zendesk, Meraki, GitHub, Dropbox, and more. Additionally, enables managers to monitor employees’ activities across multiple endpoints.\n\n\nJumpCloud Directory-as-a-Service offers an application programming interface (API), which lets businesses integrate the system with several third-party applications such as G-Suite, Azure Active Directory, Workday, and more. Pricing is based on monthly and annual subscriptions and support is extended via FAQs, knowledgebase, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7818866c-4066-4078-ba1a-03c0e105f11d.png","url":"https://www.softwareadvice.co.uk/software/180508/jumpcloud-directory-as-a-service","@type":"ListItem"},{"name":"Keeper Security","position":3,"description":"Keeper is a cloud-based business security solution that offers multi-tenant password management and secure file storage. It offers a \"zero-knowledge\" security feature, which allows users only with access to the information being stored on the device and in the Keeper cloud security vault. The solution synchronizes with multiple devices and can be used by multiple users. It allows users to create high-strength random passwords. Users can make password policies and monitor password compliance with Keeper's dashboards, reporting, auditing and notifications.\n\n\nKeeper provides mobile security and data loss prevention and is compatible with desktop computers and mobile devices. Key features include an IT admin console with password security enforcement, user provisioning, delegated administration and active directory integration.\n\n\nThe solution uses 256-bit AES encryption, PBKDF2 key generation, perfect forward secrecy and two-factor authentication. The platform works with businesses of all sizes to integrate security, privacy and internal controls. Pricing is both per month and per year.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f21ce009-05eb-4779-840b-aab7d2d73c79.jpeg","url":"https://www.softwareadvice.co.uk/software/372934/keeper-password-manager","@type":"ListItem"},{"name":"Bitwarden","position":4,"description":"Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store and share sensitive data with end-to-end encryption.\n\nShare Encrypted Information\n- Share your sensitive information safely and securely with individuals, teams, and enterprises. \n- Transmit encrypted information via a secure link to anyone through your preferred communication channel like text or email.\n\nMake Password Management Convenient\n- Generate and store your strong and unique passwords all in one place.\n- Access account credentials from anywhere, on any device with secure cloud syncing. \n- Bitwarden offers multiple client options to access your password vault including desktop, mobile, browser, web, and CLI.\n- Autofill makes it easy to quickly and securely log in to accounts.\n\nStrengthen Your Security\n- Identify potential security weaknesses like reused, exposed, or weak passwords, and other helpful data security metrics.\n- With exportable event logs, gain transparency into user activity around sensitive data within your organization's vault.\n- Login to your Bitwarden Vault with MFA for an even stronger line of defense.\n\nIntegrate into Your Tech Environment \n- Bitwarden is deployable in both cloud-based and on-premise environments.\n- Our robust Directory Connector and SCIM integration streamline user and group onboarding with automatic account provisioning and de-provisioning. \n- Seamlessly integrate Bitwarden into your existing tech stack with powerful APIs, SSO and directory service integrations, CLI automations, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09a75d31-b4fd-44c1-8b4d-6002c5fa7d76.png","url":"https://www.softwareadvice.co.uk/software/182800/bitwarden","@type":"ListItem"},{"name":"Netwrix Privilege Secure","position":5,"description":"Netwrix is a cloud-based access management software that can help users minimize the risk inherent in privileged accounts. Implement a zero standing privilege approach and create on-demand accounts with just enough access to perform a task needed. the software also helps users with passing compliance audits and with reliable proofs: record and playback privileged access sessions and easy-to-read reports on privileged users activity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f115ba7-dd14-443c-bfe5-a306bf9ff481.png","url":"https://www.softwareadvice.co.uk/software/338168/sbpam","@type":"ListItem"},{"name":"Heimdal Privileged Access Management","position":6,"description":"Heimdal Privileged Access Management is a PAM solution designed to simplify and segment the management of admin rights within an enterprise network. It ensures the proper enforcement of the principle of least privilege, which entails that user accounts operating within a system not be granted more permissions than they need to perform their daily duties. \nBy using Heimdal Privileged Access Management within your company, you can address three major needs within your company. First of all, our PAM solution is built to help any organizations achieve true access governance that is seamlessly implemented in their modern IT infrastructure. \nGartner has ranked privileged access management as the number one priority for businesses for the last three years. Therefore, managing admin rights is not only a way to save time and boost productivity, but also enhance your company’s cybersecurity. \nSecondly, Heimdal Privileged Access Management within can save sysadmins a lot of valuable time and resources. It allows them to manage all user requests in one handy place, either in the dedicated dashboard tab or on the go with the mobile app. From there, your IT administrators can view and manage escalation queries, as well as approve or deny them automatically or on a case by case basis. \nThirdly and finally, Heimdal Privileged Access Management can easily be integrated with any other Heimdal Security product. This gives it new and improved capabilities and creates a streamlined cybersecurity environment where all the moving parts that go into your enterprise protection move together in unison. \nWhen coupled with an endpoint detection solution, Heimdal Privileged Access Management becomes the only PAM solution on the market to provide automatic de-escalation of admin rights on the infected account. This stops the spread of any malicious code in your corporate network and actively prevents advanced cyberattacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/46d0bfcb-37c2-4191-8a34-dc3ca3bc249b.png","url":"https://www.softwareadvice.co.uk/software/242915/heimdal-privileged-access-management","@type":"ListItem"},{"name":"ManageEngine ADManager Plus","position":7,"description":"ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD management and reporting tasks with ease. Its all-inclusive reports for diverse AD functionalities play a vital role in data-driven decision-making. ADManager Plus also has risk assessment indicators that monitor your organization's AD environment for potential risks, risk exposure management to view potential attack paths that could leave your privileged entities vulnerable, and access certification campaigns to review user access regularly.\nIt seamlessly integrates with leading ITSM, SIEM, and HCM solutions and other third-party applications using custom APIs to enhance the scalability of IT resource management, improve the efficiency of administrative tasks, and provide consistency while handling enterprise data.\nADManager Plus offers the option to back up your data and restore it when required, preventing data loss.\nIts core features include:\n\nUser provisioning\nManage user identities and access privileges throughout the user's life span in an organization. Create accounts in AD, Microsoft 365, and Google Workspace and carry out other management tasks like password resets, account unlocks, and template-based account updates.\n\nRisk assessment\nIdentify potential security risks of your AD using a risk score indicator. Prompt decisions based on it can help mitigate the identified risks and take the security of the organization up a notch.\n\nRisk exposure management\nVisualize potential attack paths that hackers could exploit to gain access to your AD privileged entities and view required remediation measures to secure them.\n\nAccess certification campaign\nReview the user privileges using periodic audit campaigns to ensure their access is authorized and appropriate. This helps your organization follow the principle of least privilege so that admins can have better control of user access.\n\nReport management\nADManager Plus offers more than 200 prepackaged reports on objects such as users, computers, groups, OUs, and more, plus custom reports with advanced filters, ensuring admins have crucial information at their fingertips. They can carry out tasks by utilizing the in-line management actions available in the report.\n\nWorkflow\nAdmins can define workflow agents like requester, reviewer, approver and executor for every AD management action performed using ADManager Plus. Configure SLAs to ensure the timely execution of tasks by sending frequent notifications, changing priority, and reassigning requests.\n\nDelegation\nEquip non-admin users to execute routine AD administrative tasks by assigning them custom help desk roles, balancing the workload of IT admins.\n\nAutomation\nEliminate manual AD tasks by automating them to be executed at specified time intervals. For critical tasks, implement a business workflow so that the automation is supervised.\n\nOrchestration\nPerform event-driven management actions using predefined templates. Integrate HCM applications with ADManager Plus to activate bidirectional data sync between HCM applications and AD using webhooks.\n\nIntegration\nIntegrate with third-party applications using REST APIs and webhooks. Various ITSM, SIEM, and HCM tools can be integrated with ADManager Plus for centralized management and meeting compliance audit needs.\n\nBackup and recovery\nPrevent and manage data loss by periodically backing up AD, Google Workspace, and Microsoft Entra ID and recovering it when required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28958cda-088c-4757-b48b-8054d0ef96d9.png","url":"https://www.softwareadvice.co.uk/software/361323/manageengine-admanager-plus","@type":"ListItem"},{"name":"Genea Security","position":8,"description":"Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ensure the security of access across building facilities. Key features include attendance reports, credential management, key assignment and access control. \n\nBuilding teams using Genea Access Control can assign mobile keys from any device and monitor all access activity. Office administrators can assign both mobile keys and physical key fobs and cards to employees, allowing them to open gates and doors using mobile devices. The solution enables managers to assign separate access credentials to employees based on their roles. Additionally, the access control portal allows organizations to monitor all access activities in real-time by viewing all event logs including doors being held open and force attempts. \n\nGenea Access Control also lets teams lock and unlock doors remotely and integrate the platform with existing systems and other third-party applications, such as Okta, Slack, GSuite and more. Support is extended via phone, email, live chat and inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b62fd9df-c63c-4ff1-82f5-2e3889a17a85.png","url":"https://www.softwareadvice.co.uk/software/194830/genea-access-control","@type":"ListItem"},{"name":"Rippling","position":9,"description":"Rippling is an integrated workforce management platform that unifies HR, IT, and finance tools to streamline operations. It centralizes employee data and automates tasks, offering features such as workflow studio for automation, reporting analytics, automated policies, and permissions management. Rippling provides specialized suites for various needs: Rippling HR manages the employee lifecycle, Rippling Payroll automates payments and direct deposits, IT tools enhance IT security with identity and device management, and the Finance suite integrates corporate cards, expenses, and accounts payable automatically. It also supports global compliance for onboarding and management across countries. Rippling is an all-in-one platform that offers a wide range of features to streamline HR operations, enhance security measures, automate payroll processes and control company costs. With its focus on scalability, security, automation and cost management, Rippling empowers businesses to optimize their workforce operations, reduce risks and achieve operational efficiency across their organization.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7ec57690-a46d-4978-83cf-a6f85c097649.png","url":"https://www.softwareadvice.co.uk/software/410674/rippling","@type":"ListItem"},{"name":"BeyondTrust Remote Support","position":10,"description":"BeyondTrust Remote Support helps you to support all of your systems over the web, even if they are behind firewalls you don't control. BeyondTrust Remote Suport works across Windows, Mac, Linux, Android, iOS, and Chrome OS. Access and control any remote computer or deivce, on or off the network-no VPN required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/96ec7354-2381-41f5-acf5-2d4b7ca212aa.png","url":"https://www.softwareadvice.co.uk/software/127126/bomgar","@type":"ListItem"},{"name":"ScreenConnect","position":11,"description":"ScreenConnect is a cloud-based operations management solution that allows technicians to perform remote support, gain remote access and run remote meetings. It acts as a meeting point for technicians and customers, enabling them to receive solutions without phone or chat sessions.\n\n\nThe solution's remote support allows users to remotely view and control devices, servers or workstations. Users can create and manage sessions from a customizable and brandable centralized control panel.\n\n\nWith ScreenConnect's remote access, users can gain access to and control unattended servers or computers. This model helps users install and upgrade customer computers without requiring manually enabled connections.\n\n\nScreenConnect's remote meeting and presentation feature allows users to share their screen with one or more individuals. Users can collaborate with team members, provide project updates, conduct training sessions and make presentations. ScreenConnect allows the presenter to share their screen with the audience. It offers a mobile application for iOS and Android devices.\n\n\nScreenConnect is available on an annual subscription basis that includes support via phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a9e546da-675b-4ad7-b27a-7a01abf09846.png","url":"https://www.softwareadvice.co.uk/software/390169/ScreenConnect","@type":"ListItem"},{"name":"Okta","position":12,"description":"Okta is a workforce identity management platform designed to provide centralized access control and user administration for employees and work partners. It supports organizations in securing their workforce while managing access to various business applications and systems.\n\nThe platform includes features such as pre-built integrations to connect with existing business technologies. It offers centralized management of users, groups, and devices through a single interface. Automated onboarding and offboarding capabilities enable administrators to efficiently manage user access with minimal manual effort.\n\nOkta is used by organizations across different industries for identity and access management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37d97abb-49dc-4a9f-a027-0925c44e3c6b.png","url":"https://www.softwareadvice.co.uk/software/419181/okta","@type":"ListItem"},{"name":"Cisco Duo","position":13,"description":"Cisco Duo is a cloud-based workforce identity security solution that secures access to your applications, for any user and device, from anywhere. Easy to use and deploy, Duo provides identity-first protection and deep visibility across your identity ecosystem.  \n\nDuo verifies users' identities and establishes device trust in any IT and security environment: \n\n- Multi-cloud, hybrid, and on-premises application support \n\n- Diverse mix of operating systems and deep integrations with leading technology providers \n\n- Unique use cases including supporting homegrown and legacy apps, securing third-party devices, and protecting Winlogon and RDP \n\nPaired with deep insights into users’ devices, Duo gives you the policies and control to manage access based on endpoint health or user risk level which can change between authentication attempts. By providing simple, seamless end user and administrator experiences, Duo dramatically reduces your total cost of ownership. \n\nDuo Continuous Identity Security combines Cisco Identity Intelligence with Duo Passport to stop identity-based threats and boost workforce productivity. Cisco Identity Intelligence provides visibility across your identity sources into multi-factor authentication (MFA) usage, admin controls, unmanaged device access, inactive or dormant accounts, excessive permissions, and more.  Duo Passport eliminates MFA fatigue by minimizing authentication requests and friction in trusted scenarios throughout the workday. After login, Duo continually evaluates trust for every access request and doesn’t prompt users again for authentication if the context remains the same. \n\nPrior to granting access to critical resources, Duo verifies users’ identities with strong MFA. Duo passwordless and single sign-on (SSO) build on MFA to verify user identity with authentication tools like biometrics, FIDO2 security keys, and push notifications from the Duo Mobile app. \n\nWhile establishing user trust is essential, you also need to have trust in the devices accessing applications on your network. Duo’s device trust tools deliver visibility into devices, assess their security posture, and continuously verify trust to allow or block access. \n\n- Duo Device Insight inventories every endpoint and provides data on OS, platform, browser and plugin versions, including passcode, screen lock, full disk encryption, and rooted/jailbroken status. Easily search, filter, and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest vulnerabilities. \n\n- Duo Desktop, a native client app for macOS, Windows, and ChromeOS, enables you to enforce corporate device health policies such as checking OS version and patch level, password and firewall status, AV agent enabled, disk encryption, and management status.  \n\n- Self-remediation enables you to block non-compliant devices at the point of authentication and empower users to bring devices back into compliance without contacting IT. Automatically notify users of outdated devices with direct links to update to the latest software version. Provide a grace period before application access is blocked, or block immediately with permissions reinstated once the device has been updated.  \n\n- Duo Trusted Endpoints helps you define and manage trust for every endpoint, whether managed or unmanaged, company-issued, contractor-owned, or personal Bring-Your-Own-Device (BYOD). Create your own inventory of trusted devices with the option to add and remove devices, include a description, set a trust expiration date, and more.  \n\nDuo bundles basic support with every subscription purchase. Duo Quick Start provides 60 days of expert advice from our trusted deployment advisors. With Duo Care, our premium support service, you'll work with a team of Duo experts who will guide you through the life of your subscription to help you maximize the value of your Duo investment as your organization and business needs evolves.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1c054704-dda9-4998-a805-b9fa3169766b.png","url":"https://www.softwareadvice.co.uk/software/430527/duo-security","@type":"ListItem"},{"name":"SecureLink","position":14,"description":"SecureLink is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging Zero Trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Organizations across multiple industries -- including healthcare, manufacturing, government, legal, and gaming -- trust SecureLink to secure all forms of critical access, from remote access for third parties to access to critical infrastructure, regulated information, IT, and OT. \n\nOur product line includes:\n\nSecureLink Enterprise Access is a zero-trust, secure remote access platform for third parties who need enterprise network access. It gives organizations control over third-party network access using tools like fine-grained access controls, zero-trust network access, and auditing and video recording capabilities.\n\nSecureLink Customer Connect is built specifically for technology vendors, managed service providers, and other partners. It provides smooth and secure remote access into customer networks to streamline remote support operations.\n\nSecureLink Access Intelligence automates user access reviews. It inventories which employees have access to what systems and delegates the access review to managers and supervisors who can make quick approvals, rejections, or changes to access rights.\n\nSecureLink’s Privacy Monitor uses artificial intelligence and machine learning to automatically audit all access and flag any suspicious behavior, making things easier for your compliance team and saving auditors time on investigating the access. Did we mention it meets regulatory requirements, like HIPAA compliance?\n\nProtecting your company from cyber threats is no longer optional -- it’s critical. Let SecureLink’s critical access management solutions bring you security, compliance, and efficiency. No compromises.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbcdf2fd-c5be-47c7-b8d3-0026c6c51564.png","url":"https://www.softwareadvice.co.uk/software/46985/securelink","@type":"ListItem"},{"name":"Auth0","position":15,"description":"Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is a highly customizable product that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1727a37-7505-40cf-896e-edf3a2a4583e.png","url":"https://www.softwareadvice.co.uk/software/107607/auth0","@type":"ListItem"},{"name":"LogMeOnce","position":16,"description":"LogMeOnce is a cloud-based password and identity management solution that enables businesses of all sizes to manage login credentials and provide secure access to documents, applications and services via a unified portal. The platform allows organizations to protect user accounts against hack attempts and identity theft by scanning the dark web for stolen passwords.\n\nLogMeOnce includes cloud storage encryption capabilities, which allow users to encrypt images, files, documents and other data stored on Google Drive, Dropbox, OneDrive and other storage applications. It offers a host of features such as auto-login, user/group management, Single Sign-On (SSO) and two-factor authentication, geofencing and more. Additionally, enterprises can personalize the interface with custom logos to establish brand identity.\n\nLogMeOnce lets managers generate reports to view and monitor identity and password vulnerabilities through charts and security metrics. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac803329-fe75-4204-8d68-2ca5d22d8a3b.png","url":"https://www.softwareadvice.co.uk/software/407877/logmeonce","@type":"ListItem"},{"name":"Veriato Workforce Behavior Analytics","position":17,"description":"At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing activity, we empower organizations to optimize their teams, mitigate risks, and make informed decisions.\n\nVeriato offers two core solutions to meet the challenges of today’s organizations. Veriato UAM is a User Activity Monitoring platform that provides real-time visibility into employee actions to enhance productivity, protect critical assets, and ensure regulatory compliance. Veriato Cerebral, our Insider Risk Management solution, leverages advanced risk scoring and User Behavior Analytics (UBA) to prevent insider threats and pinpoint risks before they escalate proactively.\n\nFor over twenty years, Veriato has been a trusted leader in workforce monitoring and insider risk management, serving enterprises, SMBs, and government agencies in more than 70 countries.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/27c29e8a-b954-4721-912a-b40da759fb38.png","url":"https://www.softwareadvice.co.uk/software/380080/cerebral","@type":"ListItem"},{"name":"GoodAccess","position":18,"description":"GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. \n\nBy leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. \n\nOur platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. \n\nGoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments.\n\nStart your 14-day full-featured free trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f55a07d-b749-4b55-9def-de441bfbb8b2.png","url":"https://www.softwareadvice.co.uk/software/186523/goodaccess","@type":"ListItem"},{"name":"OneLogin","position":19,"description":"OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web applications, data centers, cloud storage and more. Key features include single sign-on, web access management, adaptive and multi-factor authentication and mobile identity tracking.\n\n\nOneLogin’s web access management tool integrates with the existing web servers and helps businesses secure their web applications. Its adaptive authentication feature uses machine learning to determine the kind of security access that users need to fill in order to access the system. The solution uses a multi-factor authentication system that validates users’ identity through standard user ID and passwords along with one-time passwords (OTP) shared via mobile app and text messages, Duo Security, RSA and more.\n\n\nOneLogin is available on a per user per month subscription basis. Support is offered via phone, email and an online knowledge repository. The solution is used in a variety of businesses including education, energy, manufacturing, government, finance and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/920aaefd-244a-4931-8332-43973d59fe68.png","url":"https://www.softwareadvice.co.uk/software/143308/onelogin","@type":"ListItem"},{"name":"Teramind","position":20,"description":"Teramind offers employee monitoring, insider threat detection, and data loss prevention (DLP) solutions. Teramind UAM monitors user activities on applications, websites, file systems, network, email, social media and more. Behavioral rules can be created to automatically warn, block, notify, lockout or take other actions when an anomaly is detected. Its session recording feature allows investigation of incidents with video and optional audio recordings of users' desktop.\n\n\nTeramind DLP comes with all the features available in Teramind UAM plus: automated data discovery and classification with built-in support for many sensitive data types for personal information, health and financial information (PII/PHI/PFI). Its optical character recognition (OCR) module can detect content in real-time even inside images and videos. With support for activities, scheduling, and content-based rules, the system is effective in preventing data leaks in a wide range of scenarios including conforming with regulations like GDPR, HIPAA, PCI DSS and more.     \n\n\nThe solution can either be hosted in the cloud, on-premise or private cloud such as Amazon Web Services (AWS) and Microsoft Azure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/459e44be-5421-4bf0-a654-bdab53451701.png","url":"https://www.softwareadvice.co.uk/software/156340/teramind","@type":"ListItem"},{"name":"Ivanti Connect Secure","position":21,"description":"Ivanti Connect Secure is a SSL VPN solution. It provides remote and mobile users access to corporate resources from any web-enabled device, at any time and location. This SSL VPN is widely used by organizations across various industries, such as healthcare, higher education, logistics, public sector, and others.\n\nThe solution offers a single unified client for both remote and on-site access, making it easy to manage. It integrates with Directory Services, Identity Services, EMM/MDM, SIEM, and NGFWs. Ivanti Connect Secure features dynamic adaptive multi-factor authentication, such as biometric authentication, TOTP, SAML 2.0, PKI, IAM, and digital certificates. The solution ensures stateful endpoint compliance, requiring all devices to meet security requirements before connecting. Users can access on-premises and cloud-based resources with simple, secure, and streamlined single sign-on.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/57f1f3fa-4576-47ed-9465-758ef5443bd2.jpeg","url":"https://www.softwareadvice.co.uk/software/451208/Connect-Secure","@type":"ListItem"},{"name":"Passportal","position":22,"description":"N-able Passportal is a cloud-based solution, which helps small to large managed service providers (MSPs) automate password protection and organize relative documents. Key features include credential injection, password change management, auditing, and reporting. \n\nThe application enables administrators to generate new passwords, remove re-used ones and set expiration dates for routine maintenance. Network engineers can use N-able Passportal to monitor user activities and track issues through credential usage. Additionally, the system helps supervisors revoke the credentials of former employees and auto-capture new passwords to ensure compliance. \n\nN-able Passportal comes with a self-service portal, which lets end users reset passwords by receiving notifications and authenticating identity using biometric or touch ID. It comes with a mobile application for iOS and Android. Pricing is available on request and support is provided via phone and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f7e10cd-0435-4fdb-9ceb-839665f97c9c.png","url":"https://www.softwareadvice.co.uk/software/91798/solarwinds-passportal","@type":"ListItem"},{"name":"ThreatLocker","position":23,"description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e1c711e-8cee-47c7-9f15-9f13dcba68b8.png","url":"https://www.softwareadvice.co.uk/software/314278/threatlocker","@type":"ListItem"},{"name":"Perimeter 81","position":24,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.co.uk/software/230245/perimeter-81","@type":"ListItem"},{"name":"ManageEngine ADAudit Plus","position":25,"description":"ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensive logon auditing, detailed change monitoring, real-time risk alerting, and streamlined compliance reporting for Active Directory, Azure AD, file servers, Windows servers and workstations.  It helps users monitor and generate real-time change audit reports on Active Directory objects such as users, computers, groups, organizational units and more. Auditing user logon and logoff activity provides deeper insights into user behavior and helps detect anomalous logons using UBA. ADAudit Plus also alerts users in real-time through SMS or email notifications whenever any critical changes to the contents or configurations of Active Directory are detected. \n\nADAudit Plus offers its services through an annual subscription model, and users can access support resources via an online knowledge base, email, phone, and chat. The platform boasts a range of top features that cater to the specific needs of Windows Server environments. These features include real-time change notifications, allowing users to receive instant alerts on system alterations and user activities. Windows logon monitoring functionality enables the continuous tracking of user logon activities and related data, while account lockout analysis helps to identify the root causes of authentication failures. Additionally, the tool offers robust file change monitoring capabilities, enabling auditing of file accesses and permission modifications across various file systems.\n\nOther notable features encompass security and compliance reporting tools, Azure AD auditing capabilities, privileged user monitoring, and detailed reporting on activities related to ADFS, USB usage, and printer activities. Furthermore, ADAudit Plus provides functionalities for employee time tracking, monitoring active and idle time on workstations, as well as file integrity monitoring features to oversee file modifications, deletions, and access permission changes within the network. ADAudit Plus provides its services on an annual subscription basis. Support is available through an online knowledge base, email, phone, and chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4223f3a6-931e-4338-b0bc-a9fd0b954c69.png","url":"https://www.softwareadvice.co.uk/software/361342/manageengine-adaudit-plus","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4241/privileged-access-management/software#itemlist","numberOfItems":25}
</script>
