Privileged Access Management (PAM) Solutions
Privileged access refers to special access rights or capabilities beyond those of a standard user in an enterprise context. +Show More
Products | Position | Customer satisfaction | |||
---|---|---|---|---|---|
|
Leader
|
Satisfactory
|
|
||
The JumpCloud Open Directory Platform™ helps IT teams Make (Remote) Work Happen™ by centralizing management of user identities and devices, enabling small and medium-sized enterprises to adopt Zero Trust security models. JumpCloud® has a global user base of more than 180,000 organizations, with more than 5,000 paying customers including Cars.com, GoFundMe, Grab, ClassPass, Uplight, Beyond Finance, and Foursquare. JumpCloud has raised over $400M from world-class investors including Sapphire Ventures, General Atlantic, Sands Capital, Atlassian, and CrowdStrike.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
50-100 case studies
Company's number of employees
400-1k employees
Company's social media followers
50k-100k followers
Total funding
$250-500m
# of funding rounds
12
Latest funding date
October 19, 2021
Last funding amount
$50-100m
Company
Type of company
private
Founding year
2012
|
|||||
|
Leader
|
Satisfactory
|
|
||
Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
100k-1m employees
Company's social media followers
30m-40m followers
Company
Type of company
private
Founding year
2011
|
|||||
|
Leader
|
Satisfactory
|
|
||
Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
1-5 case studies
Company's number of employees
5-10 employees
Company's social media followers
1k-2k followers
Total funding
$1-5m
# of funding rounds
2
Latest funding date
January 31, 2019
Last funding amount
$1-5m
Company
Type of company
private
Founding year
2015
|
|||||
|
Leader
|
Satisfactory
|
|
||
Ping Identity (NYSE: PING) builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory and more. Ping helps enterprises balance security and user experience for workforce, customer and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software and more. Ping has solutions for both IT and developer teams. Visit www.pingidentity.com to learn more.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
1k-2k employees
Company's social media followers
100k-1m followers
Total funding
$10-50m
# of funding rounds
5
Latest funding date
May 27, 2014
Last funding amount
$1-5m
Company
Type of company
private
Founding year
2007
|
|||||
|
Leader
|
Satisfactory
|
|
||
CyberArk offers Identity Securitycentered on privileged access management. CyberArk provides a security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle, and their solutions are used to secure all identities and critical assets. CyberArk PAM solutions protect sensitive access across on-premises, cloud, and hybrid infrastructures. Designed from the ground up for security, PAM solutions help organizations by measurably reducing cyber-risk. This is accomplished by managing privileged account credentials and access rights, proactively isolating and monitoring privileged account activity, and quickly responding to threats. CyberArk PAM solutions can work with CyberArk Identity Single Sign-On and Multifactor Authentication tools, to securely access to on-premises, cloud, mobile and legacy apps. CyberArk PAM also works with third party MFA and SSO solutions as well. Customers have 350+ OOTB software integrations available in the CyberArk Marketplace, with over 235 technology vendors, ranging from security technologies, cloud service providers, IoT, OT, and web applications.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
50-100 case studies
Company's number of employees
3k-4k employees
Company's social media followers
100k-1m followers
|
|||||
|
Challenger
|
Satisfactory
|
|
||
HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault's main use cases include: - Secrets Management - Identity Brokering - Data Encryption
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
100-200 case studies
Company's number of employees
2k-3k employees
Company's social media followers
100k-1m followers
Total funding
$250-500m
# of funding rounds
7
Latest funding date
March 1, 2021
Company
Type of company
public
Founding year
2012
|
|||||
|
Challenger
|
Satisfactory
|
|
||
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
20-30 case studies
Company's number of employees
50-100 employees
Company's social media followers
2k-3k followers
Company
Type of company
private
Founding year
2013
|
|||||
|
Challenger
|
Satisfactory
|
|
||
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
100k-1m employees
Company's social media followers
10m-20m followers
Company
Type of company
private
Founding year
1996
|
|||||
|
Challenger
|
Satisfactory
|
|
||
Trying to authenticate, provision, and audit a rotating population of support technicians is a challenge that often results in shared logins, security vulnerabilities, and a lack of vendor accountability. SecureLink Enterprise Access allows you to manage and control the critical access your third parties need to systems, servers, and databases via a single solution, without having to sacrifice efficiency or security.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
100-200 employees
Company's social media followers
5k-10k followers
# of funding rounds
2
Latest funding date
September 8, 2020
Company
Type of company
private
Founding year
2003
|
|||||
|
Challenger
|
Satisfactory
|
|
||
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security. Features include: - Privileged Access Control: Enforce least privilege by giving users the right level of access. - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections. - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway. - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials. - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere. - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
400-1k employees
Company's social media followers
40k-50k followers
|
“-”: AIMultiple team has not yet verified that vendor provides the specified feature. AIMultiple team focuses on feature verification for top 10 vendors.
Sources
AIMultiple uses these data sources for ranking solutions and awarding badges in privileged access management (PAM) solutions:
Privileged Access Management Leaders
According to the weighted combination of 4 metrics



What are privileged access management
customer satisfaction leaders?
Taking into account the latest metrics outlined below, these are the current privileged access management customer satisfaction leaders:



Which privileged access management solution provides the most customer satisfaction?
AIMultiple uses product and service reviews from multiple review platforms in determining customer satisfaction.
While deciding a product's level of customer satisfaction, AIMultiple takes into account its number of reviews, how reviewers rate it and the recency of reviews.
- Number of reviews is important because it is easier to get a small number of high ratings than a high number of them.
- Recency is important as products are always evolving.
- Reviews older than 5 years are not taken into consideration
- older than 12 months have reduced impact in average ratings in line with their date of publishing.
What are privileged access management
market leaders?
Taking into account the latest metrics outlined below, these are the current privileged access management market leaders:



Which one has collected the most reviews?
AIMultiple uses multiple datapoints in identifying market leaders:
- Product line revenue (when available)
- Number of reviews
- Number of case studies
- Number and experience of employees
- Social media presence and engagement
What are the most mature privileged access management (PAM) solutions?
Which one has the most employees?




Which privileged access management companies have the most employees?
387 employees work for a typical company in this solution category which is 364 more than the number of employees for a typical company in the average solution category.
In most cases, companies need at least 10 employees to serve other businesses with a proven tech product or service. 35 companies with >10 employees are offering privileged access management (pam) solutions. Top 3 products are developed by companies with a total of 700k employees. The largest company in this domain is IBM with more than 300,000 employees. IBM provides the privileged access management solution: IBM Security Verify Privilege Manager
Insights
What are the most common words describing privileged access management (PAM) solutions?
This data is collected from customer reviews for all privileged access management companies. The most positive word describing privileged access management (PAM) solutions is “Easy to use” that is used in 8% of the reviews. The most negative one is “Difficult” with which is used in 3% of all the privileged access management reviews.
What is the average customer size?
According to customer reviews, most common company size for privileged access management customers is 51-1,000 employees. Customers with 51-1,000 employees make up 44% of privileged access management customers. For an average Cybersecurity solution, customers with 51-1,000 employees make up 37% of total customers.
Customer Evaluation
These scores are the average scores collected from customer reviews for all privileged access management (PAM) solutions. Privileged Access Management (PAM) Solutions are most positively evaluated in terms of "Overall" but falls behind in "Likelihood to Recommend".
Where are privileged access management vendors' HQs located?
Trends
What is the level of interest in privileged access management (PAM) solutions?
This category was searched on average for 512 times per month on search engines in 2024. This number has decreased to 0 in 2025. If we compare with other cybersecurity solutions, a typical solution was searched 918 times in 2024 and this decreased to 0 in 2025.