Privileged Access Management (PAM) Solutions

Last update: January 16, 2025

Privileged access refers to special access rights or capabilities beyond those of a standard user in an enterprise context. +Show More

Privileged access refers to special access rights or capabilities beyond those of a standard user in an enterprise context. Privileged access management (PAM) is the process of controlling privileged access permissions for users or accounts in an IT environment.

If you’d like to learn about the ecosystem consisting of Privileged Access Management (PAM) Solutions and others, feel free to check AIMultiple Cybersecurity.
How relevant, verifiable metrics drive AIMultiple’s rankings

AIMultiple uses relevant & verifiable metrics to evaluate vendors.

Metrics are selected based on typical enterprise procurement processes ensuring that market leaders, fast-growing challengers, feature-complete solutions and cost-effective solutions are ranked highly so they can be shortlisted.
Data regarding these metrics are collected from public sources as outlined in the “What are AIMultiple’s data sources?” section of this page.


There are 2 ways in which vendor metrics are processed to help prioritization:
1- Vendors are grouped within 4 metrics (customer satisfaction, market presence, growth and features) according to their performance in that metric.
2- Vendors that perform high in these metrics are ranked higher in the list.


The data used in each vendor’s ranking can be accessed by expanding the vendor’s row in the below list.
This page includes links to AIMultiple’s sponsors. Sponsored links are included in “Visit Website” buttons and ranked at the top of the list when results are sorted by “Sponsored”. Sponsors have no say over the ranking which is based on market data. Organic ranking can be seen by sorting by “AIMultiple” or other sorting approaches. For more on how AIMultiple works, please see the ethical standards that we follow and how we fund our research.

Products Position Customer satisfaction
JumpCloud logo

JumpCloud

Leader
Satisfactory
The JumpCloud Open Directory Platform™ helps IT teams Make (Remote) Work Happen™ by centralizing management of user identities and devices, enabling small and medium-sized enterprises to adopt Zero Trust security models. JumpCloud® has a global user base of more than 180,000 organizations, with more than 5,000 paying customers including Cars.com, GoFundMe, Grab, ClassPass, Uplight, Beyond Finance, and Foursquare. JumpCloud has raised over $400M from world-class investors including Sapphire Ventures, General Atlantic, Sands Capital, Atlassian, and CrowdStrike.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.43 / 5 based on 1k reviews
Market presence
Number of case studies
50-100 case studies
Company's number of employees
400-1k employees
Company's social media followers
50k-100k followers
Total funding
$250-500m
# of funding rounds
12
Latest funding date
October 19, 2021
Last funding amount
$50-100m
Company
Type of company
private
Founding year
2012
Microsoft Azure Active Directory logo

Microsoft Azure Active Directory

Leader
Satisfactory
Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.50 / 5 based on ~400 reviews
Market presence
Company's number of employees
100k-1m employees
Company's social media followers
30m-40m followers
Company
Type of company
private
Founding year
2011
Foxpass logo

Foxpass

Leader
Satisfactory
Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.80 / 5 based on ~50 reviews
Market presence
Number of case studies
1-5 case studies
Company's number of employees
5-10 employees
Company's social media followers
1k-2k followers
Total funding
$1-5m
# of funding rounds
2
Latest funding date
January 31, 2019
Last funding amount
$1-5m
Company
Type of company
private
Founding year
2015
Ping Intelligent Identity Platform logo

Ping Intelligent Identity Platform

Leader
Satisfactory
Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory and more. Ping helps enterprises balance security and user experience for workforce, customer and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software and more. Ping has solutions for both IT and developer teams. Visit www.pingidentity.com to learn more.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.40 / 5 based on ~100 reviews
Market presence
Company's number of employees
1k-2k employees
Company's social media followers
100k-1m followers
Total funding
$10-50m
# of funding rounds
5
Latest funding date
May 27, 2014
Last funding amount
$1-5m
Company
Type of company
private
Founding year
2007
CyberArk logo

CyberArk

Leader
Satisfactory
CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets. CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats. CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well. Customers have 350+ OOTB software integrations available in the CyberArk Marketplace, with over 235 technology vendors, ranging from security technologies, cloud service providers, IoT, OT, and web applications.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.40 / 5 based on ~50 reviews
Market presence
Number of case studies
50-100 case studies
Company's number of employees
3k-4k employees
Company's social media followers
100k-1m followers
HashiCorp Vault logo

HashiCorp Vault

Challenger
Satisfactory
HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault's main use cases include: - Secrets Management - Identity Brokering - Data Encryption
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.47 / 5 based on ~50 reviews
Market presence
Number of case studies
100-200 case studies
Company's number of employees
2k-3k employees
Company's social media followers
100k-1m followers
Total funding
$250-500m
# of funding rounds
7
Latest funding date
March 1, 2021
Company
Type of company
public
Founding year
2012
Ekran System logo

Ekran System

Challenger
Satisfactory
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.47 / 5 based on ~40 reviews
Market presence
Number of case studies
20-30 case studies
Company's number of employees
50-100 employees
Company's social media followers
2k-3k followers
Company
Type of company
private
Founding year
2013
AWS Secrets Manager logo

AWS Secrets Manager

Challenger
Satisfactory
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.65 / 5 based on ~20 reviews
Market presence
Company's number of employees
100k-1m employees
Company's social media followers
10m-20m followers
Company
Type of company
private
Founding year
1996
SecureLink for Enterprise logo

SecureLink for Enterprise

Challenger
Satisfactory
Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. SecureLink Enterprise Access allows you to manage and control the critical access your third parties need to systems, servers, and databases via a single solution, without having to sacrifice efficiency or security.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.30 / 5 based on ~50 reviews
Market presence
Company's number of employees
100-200 employees
Company's social media followers
5k-10k followers
# of funding rounds
2
Latest funding date
September 8, 2020
Company
Type of company
private
Founding year
2003
BeyondTrust Privileged Remote Access logo

BeyondTrust Privileged Remote Access

Challenger
Satisfactory
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security. Features include: - Privileged Access Control: Enforce least privilege by giving users the right level of access. - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections. - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway. - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials. - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere. - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
Basis for Evaluation

We made these evaluations based on the following parameters;

Customer satisfaction
Average rating
4.48 / 5 based on ~30 reviews
Market presence
Company's number of employees
400-1k employees
Company's social media followers
40k-50k followers

“-”: AIMultiple team has not yet verified that vendor provides the specified feature. AIMultiple team focuses on feature verification for top 10 vendors.


Sources

AIMultiple uses these data sources for ranking solutions and awarding badges in privileged access management (PAM) solutions:


43 vendor web domains
29 funding announcements
106 social media profiles
108 profiles on review platforms
45 search engine queries

Privileged Access Management Leaders

According to the weighted combination of 4 metrics

JumpCloud logo
Microsoft Azure Active Directory logo
Foxpass logo
Ping Intelligent Identity Platform logo
CyberArk logo

What are privileged access management
customer satisfaction leaders?

Taking into account the latest metrics outlined below, these are the current privileged access management customer satisfaction leaders:

JumpCloud logo
Microsoft Azure Active Directory logo
Foxpass logo
Ping Intelligent Identity Platform logo
HashiCorp Vault logo

Which privileged access management solution provides the most customer satisfaction?

AIMultiple uses product and service reviews from multiple review platforms in determining customer satisfaction.

While deciding a product's level of customer satisfaction, AIMultiple takes into account its number of reviews, how reviewers rate it and the recency of reviews.

  • Number of reviews is important because it is easier to get a small number of high ratings than a high number of them.
  • Recency is important as products are always evolving.
  • Reviews older than 5 years are not taken into consideration
  • older than 12 months have reduced impact in average ratings in line with their date of publishing.

What are privileged access management
market leaders?

Taking into account the latest metrics outlined below, these are the current privileged access management market leaders:

JumpCloud logo
Microsoft Azure Active Directory logo
Foxpass logo
Ping Intelligent Identity Platform logo
CyberArk logo

Which one has collected the most reviews?

AIMultiple uses multiple datapoints in identifying market leaders:

  • Product line revenue (when available)
  • Number of reviews
  • Number of case studies
  • Number and experience of employees
  • Social media presence and engagement
Out of these, number of reviews information is available for all products and is summarized in the graph:

JumpCloud
Microsoft Azure Active Directory
Ping Intelligent Identity Platform
ManageEngine Password Manager Pro
Foxpass

What are the most mature privileged access management (PAM) solutions?

Which one has the most employees?

IBM logo
Dynamic Netsoft Technologies logo
DataScience logo
AWS logo
Dell EMC logo

Which privileged access management companies have the most employees?

387 employees work for a typical company in this solution category which is 364 more than the number of employees for a typical company in the average solution category.

In most cases, companies need at least 10 employees to serve other businesses with a proven tech product or service. 35 companies with >10 employees are offering privileged access management (pam) solutions. Top 3 products are developed by companies with a total of 700k employees. The largest company in this domain is IBM with more than 300,000 employees. IBM provides the privileged access management solution: IBM Security Verify Privilege Manager

IBM
Dynamic Netsoft Technologies
DataScience
AWS
Dell EMC

Insights

What are the most common words describing privileged access management (PAM) solutions?

This data is collected from customer reviews for all privileged access management companies. The most positive word describing privileged access management (PAM) solutions is “Easy to use” that is used in 8% of the reviews. The most negative one is “Difficult” with which is used in 3% of all the privileged access management reviews.

What is the average customer size?

According to customer reviews, most common company size for privileged access management customers is 51-1,000 employees. Customers with 51-1,000 employees make up 44% of privileged access management customers. For an average Cybersecurity solution, customers with 51-1,000 employees make up 37% of total customers.

Customer Evaluation

These scores are the average scores collected from customer reviews for all privileged access management (PAM) solutions. Privileged Access Management (PAM) Solutions are most positively evaluated in terms of "Overall" but falls behind in "Likelihood to Recommend".

Overall
Customer Service
Ease of Use
Likelihood to Recommend
Value For Money

Where are privileged access management vendors' HQs located?

What is the level of interest in privileged access management (PAM) solutions?

This category was searched on average for 512 times per month on search engines in 2024. This number has decreased to 0 in 2025. If we compare with other cybersecurity solutions, a typical solution was searched 918 times in 2024 and this decreased to 0 in 2025.

Related Solutions